Analysis

  • max time kernel
    140s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    31/05/2024, 02:17

General

  • Target

    bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe

  • Size

    1.5MB

  • MD5

    3d0a97d15c9a9db1cbc57bc8a9a422b8

  • SHA1

    08cde344efc7f8a8c614023e2d0d4c91fbc972fe

  • SHA256

    bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d

  • SHA512

    ae9cb0b12d1812c015446ea21ab7bcfb35729682bd9e2b16f2a6321c12a291dd40d3b4552ca2234425aae71a78bb25a3b8acd16b6d8016b83c27362141dbea17

  • SSDEEP

    3072:6R4jdNqTqHLklZpb4RrRDFBI/cMrnTS4y3NkEjbvjuC8xVkxRQjZ3phRrbBgmQD:kafcEHI/prnm4y3NjTjuC8xOcxphgmQ

Score
9/10

Malware Config

Signatures

  • Detects executables built or packed with MPress PE compressor 5 IoCs
  • Enumerates connected drives 3 TTPs 10 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe
    "C:\Users\Admin\AppData\Local\Temp\bba65e07ea7b26f7cb83fd34e60a030ea064855997d0ff5c77c062aae6c5c12d.exe"
    1⤵
    • Enumerates connected drives
    • Sets desktop wallpaper using registry
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 968
      2⤵
      • Program crash
      PID:1924

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\7-Zip\7z.cab

    Filesize

    544KB

    MD5

    9a1dd1d96481d61934dcc2d568971d06

    SHA1

    f136ef9bf8bd2fc753292fb5b7cf173a22675fb3

    SHA256

    8cebb25e240db3b6986fcaed6bc0b900fa09dad763a56fb71273529266c5c525

    SHA512

    7ac1581f8a29e778ba1a1220670796c47fa5b838417f8f635e2cb1998a01515cff3ee57045dacb78a8ec70d43754b970743aba600379fe6d9481958d32d8a5aa

  • C:\Program Files\7-Zip\7zFM.cab

    Filesize

    930KB

    MD5

    30ac0b832d75598fb3ec37b6f2a8c86a

    SHA1

    6f47dbfd6ff36df7ba581a4cef024da527dc3046

    SHA256

    1ea0839c8dc95ad2c060af7d042c40c0daed58ce8e4524c0fba12fd73e4afb74

    SHA512

    505870601a4389b7ed2c8fecf85835adfd2944cbc10801f74bc4e08f5a0d6ecc9a52052fc37e216304cd1655129021862294a698ed36b3b43d428698f7263057

  • C:\Program Files\7-Zip\RCX197A.tmp

    Filesize

    180KB

    MD5

    0fe0f69130828847307e44577a335e2c

    SHA1

    aeb72c518fb4c9f75ff7d677323da13bc009e8d6

    SHA256

    61913910d0b3ae16e8dc78ca07dd59fe9b15f53aec6f393de44481de806803a9

    SHA512

    61dbe321cb265e0ba8e22acff6b09c9afea4e8d27939287fb90733a85b81576ebbe1ed7dc8feb6c29e5023244c42fd83fa088c66ac5698fdb07fceee8bf04326

  • C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.cab

    Filesize

    118KB

    MD5

    f45a7db6aec433fd579774dfdb3eaa89

    SHA1

    2f8773cc2b720143776a0909d19b98c4954b39cc

    SHA256

    2bc2372cfabd26933bc4012046e66a5d2efc9554c0835d1a0aa012d3bd1a6f9a

    SHA512

    03a4b7c53373ff6308a0292bb84981dc1566923e93669bbb11cb03d9f58a8d477a1a2399aac5059f477bbf1cf14b17817d208bc7c496b8675ece83cdabec5662

  • C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_pwa_launcher.cab

    Filesize

    1.6MB

    MD5

    527e039ba9add8a7fac3a6bc30a6d476

    SHA1

    729a329265eda72cada039c1941e7c672addfc19

    SHA256

    4b8a72fc81b733ed2e6e70d4c5401f954002783dbf14927849ad579860780b94

    SHA512

    9e73e14e33a5f07a87e9c1fecfdaee09d1408471052aacfde3d1e877dad4d253b525ebefca6bddabc23cf81d8dcce0785aedcc2f135d171ecbb1feaeb922c449

  • C:\Program Files\Google\Chrome\Application\RCX1A13.tmp

    Filesize

    180KB

    MD5

    652957b921078afbc444d5fd53dee4f7

    SHA1

    b6fd1e252fbe5dcc964f5177f6602d29df5a0406

    SHA256

    a57f58e07f760c121965c83a5e814e20d5b235126eab46185642542b8539188b

    SHA512

    28097f878e7cabe934a72487c36fae8d0398b421176b81c24087a5f3dd49d2afe330d3552597620cffb0ab66851c1986cc4da3afbe623e6bcd452de34be7c412

  • C:\Program Files\Google\Chrome\Application\chrome.cab

    Filesize

    2.8MB

    MD5

    095092f4e746810c5829038d48afd55a

    SHA1

    246eb3d41194dddc826049bbafeb6fc522ec044a

    SHA256

    2f606012843d144610dc7be55d1716d5d106cbc6acbce57561dc0e62c38b8588

    SHA512

    7f36fc03bfed0f3cf6ac3406c819993bf995e4f8c26a7589e9032c14b5a9c7048f5567f77b3b15f946c5282fc0be6308a92eab7879332d74c400d0c139ce8400

  • C:\Program Files\Google\Chrome\Application\chrome.exe

    Filesize

    258KB

    MD5

    95165653731b14adb9d23dac186b4989

    SHA1

    5bfa19afff5e656a68f057832730a1949dc21249

    SHA256

    8c13261f8775474b3a23525baeea1a0bc5986c7830c4bfcc196646cc2b00f1ba

    SHA512

    0d1ebf7188245485d84feb87d56854b4979c3d95bafd4cecff84c015275fcfe9c516f680045c74b22936a1d24d4b1f10ced0ee775dd8092c1008605aba8824db

  • C:\Program Files\Google\Chrome\Application\chrome_proxy.cab

    Filesize

    1020KB

    MD5

    b65d7344b0a7faa207d2e1a7adaafb60

    SHA1

    755ad15b1745b0e730d658d4a92e2b754425b7db

    SHA256

    f4b91fbbcba8a46eefe4965e4a24c6ede3decbd1fec96e141a1953173efd1c92

    SHA512

    f17ac73c2df7c73a31b11ce0f533d6db91bdb0cdeea653dcd52ac72c3cf28da0c236b79586ddc7a6c825fdd171290722f888465e776f12ac2cae75be82726b22

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Themes\TranscodedWallpaper.jpg

    Filesize

    135KB

    MD5

    0d472c9720e55e9c249207de6c69722c

    SHA1

    7244426a440a268cb37b49005812b8f20f052776

    SHA256

    bc1d3cfb69f97bc930af3af7be8601e60eb1cc78516aa844e41c65e51c316de3

    SHA512

    f77bf33604691e0f21f1f3548187153495aad5cd5beb80b409ff50c71502e5303ddb7d64b652edc5b4177bf88e8cee0df914f91b9532b9b1116af32050291cca

  • memory/2372-0-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB

  • memory/2372-218-0x0000000000400000-0x000000000046B000-memory.dmp

    Filesize

    428KB