Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    10/07/2024, 21:57

General

  • Target

    447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe

  • Size

    464KB

  • MD5

    0177a4997568253427721379a62b7b2c

  • SHA1

    af9c25241b672871362318ce7ee825cba77bd25f

  • SHA256

    447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3

  • SHA512

    cad30a68634a8e736677c97b55d262b50fad5639baaeeabfb8da293d0bacb1f1bee18dd12fe4771e278b4d76213b432ad64ffd4ad5f740112c1d2dc380e28560

  • SSDEEP

    12288:+8lc87eqqV5e+wBV6O+WKN+vJ2Htnq2ZzXuOz:+8SqqHeVBxzvJUtFaOz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe
      "C:\Users\Admin\AppData\Local\Temp\447833e881840143891db521d3e0a5ab6810e7afa662042f002b7f91383b58c3.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:2884
      • C:\Users\Admin\AppData\Roaming\fltMexer\autotvol.exe
        "C:\Users\Admin\AppData\Roaming\fltMexer"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3020
        • C:\Users\Admin\AppData\Local\Temp\~6CA8.tmp
          1192 475144 3020 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:2916
  • C:\Windows\SysWOW64\mcbucont.exe
    C:\Windows\SysWOW64\mcbucont.exe -s
    1⤵
    • Executes dropped EXE
    PID:2612

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\~6CA8.tmp

    Filesize

    8KB

    MD5

    86dc243576cf5c7445451af37631eea9

    SHA1

    99a81c47c4c02f32c0ab456bfa23c306c7a09bf9

    SHA256

    25d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a

    SHA512

    c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4

  • \Users\Admin\AppData\Roaming\fltMexer\autotvol.exe

    Filesize

    464KB

    MD5

    004af61c03a355e135e5db5a21845daf

    SHA1

    6053c7b3d2ad9793fe0c3a90d6047c9790edb5ae

    SHA256

    92430500404a90e7d2eadea3df267448f60b39971dd1e9e7052953502b91b52f

    SHA512

    4135f3d578d4478bdc87e55b731de0fb7d30de1ac20a4419526f777bae747e3d18c7c65ea88fa2e7f0c22430a786b6dc54b878b71e5fd6440775bb5c2b0eb510

  • memory/1192-23-0x0000000003BF0000-0x0000000003C74000-memory.dmp

    Filesize

    528KB

  • memory/1192-21-0x0000000003BF0000-0x0000000003C74000-memory.dmp

    Filesize

    528KB

  • memory/1192-26-0x00000000028A0000-0x00000000028A6000-memory.dmp

    Filesize

    24KB

  • memory/1192-27-0x00000000028B0000-0x00000000028BD000-memory.dmp

    Filesize

    52KB

  • memory/1192-24-0x0000000003BF0000-0x0000000003C74000-memory.dmp

    Filesize

    528KB

  • memory/1192-22-0x0000000003BF0000-0x0000000003C74000-memory.dmp

    Filesize

    528KB

  • memory/2612-34-0x0000000000220000-0x000000000029D000-memory.dmp

    Filesize

    500KB

  • memory/2612-35-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2884-0-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/2884-1-0x0000000000220000-0x000000000029D000-memory.dmp

    Filesize

    500KB

  • memory/2884-12-0x0000000000310000-0x000000000038A000-memory.dmp

    Filesize

    488KB

  • memory/2884-13-0x0000000000310000-0x000000000038A000-memory.dmp

    Filesize

    488KB

  • memory/3020-17-0x0000000000260000-0x0000000000265000-memory.dmp

    Filesize

    20KB

  • memory/3020-31-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB

  • memory/3020-16-0x0000000000480000-0x00000000004FD000-memory.dmp

    Filesize

    500KB

  • memory/3020-14-0x0000000000400000-0x000000000047A000-memory.dmp

    Filesize

    488KB