Analysis

  • max time kernel
    103s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/07/2024, 04:55

General

  • Target

    HA_MPEG4 Modifier142_CZ.exe

  • Size

    779KB

  • MD5

    a223dde5335b1a8e241313aef6d6446d

  • SHA1

    a4ce658291e50f6d149ddbe710a23a4437170acd

  • SHA256

    c8d47ffd1989ade9debf5546be9dc475db381097f7242a32579f6141301c5c67

  • SHA512

    b3fa9154913d9f3c61d611df58b08218c79a1372882ddb11d29f21feca4c0170091bf3bd16a9af9b8fad21d330e0be1badf0327fd54b3df23d4b1f0efaf49a36

  • SSDEEP

    12288:3r9N7S2UdNJWf64H2nt8N3XvdpvIKaz/oa9SBEvTgiHOJJKyKxJKyV+pH7V:3r9N7Cif647XvdCJvTgKOIJIt7V

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\HA_MPEG4 Modifier142_CZ.exe
    "C:\Users\Admin\AppData\Local\Temp\HA_MPEG4 Modifier142_CZ.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2796

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsu1A18.tmp\ioSpecial.ini

    Filesize

    899B

    MD5

    f9ca8a4d39dfc87ee9541b1e827c42c0

    SHA1

    0655167c47ad4cff0c3f5ca660616b7c25d6d50f

    SHA256

    d76e5b01a38b81914bdc401c1bc513f18f7fc34ff8c5eb461d6ccf8526eb0314

    SHA512

    c03042ca1eba95ceaf2b05cc0e4ab8336efe3a3bedba8706a131ae49433f54b1d519b148bff0a09386c3d77f4bf5fcc2bd751ec62e914d92616c05e3c03c4b5d

  • \Users\Admin\AppData\Local\Temp\NSISUtils\msvcr71.dll

    Filesize

    340KB

    MD5

    86f1895ae8c5e8b17d99ece768a70732

    SHA1

    d5502a1d00787d68f548ddeebbde1eca5e2b38ca

    SHA256

    8094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe

    SHA512

    3b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da

  • \Users\Admin\AppData\Local\Temp\NSISUtils\nsisutils.dll

    Filesize

    4KB

    MD5

    03a477dd69bd11877e2ac1953947c400

    SHA1

    e33881e8203674cc94bc9fcbde3e1f65ed4be5c7

    SHA256

    03c50276af73bb72b533f8936a57bbabe41e3b7d5e24cf60eb32f3b9df2cdd61

    SHA512

    c8d657199b7c2e2d3c9d76897426b1b9f227bd9d341481f059ab1ae6d79514e94620ec6434e32a6a07095350c90a80bfa46384cef12e309ba6f661d2ddac81af

  • \Users\Admin\AppData\Local\Temp\nsu1A18.tmp\brandingurl.dll

    Filesize

    3KB

    MD5

    9c3488b5e9655d1837c3963ecec33f70

    SHA1

    f0fa9b4c29e75c6e4419c4633d09f2797aee2ef3

    SHA256

    05ef4beb7fab9d04c1fb251874166fa2d73a34b4a7f2b145d37a2fd00c88979a

    SHA512

    6af9f88d65d2279a71620f2a656062b1737b3a9a1692ed4e5887bdee891ce08d21c5c0b25ab3acbe6da9fe255dcd7f8a517c2751e73dc56add216740c945e4a7

  • \Users\Admin\AppData\Local\Temp\nsu1A18.tmp\installoptions.dll

    Filesize

    12KB

    MD5

    cce5450725a9429a1d3c7aa851d40e8d

    SHA1

    05722500e42757ac03f2558452a064b906e31937

    SHA256

    d850c786a68df9520a3ecf2a96f4f091c9bae71d3adbf7731e8c172533cb266d

    SHA512

    3ddb56429e097ecf942e8a5147ba4c4191c52b736df267934f0dca75ffa74faffee8911dda47c5d2542f91138abbcaf61be3e3d68b368631d6bc21e254b5c637

  • \Users\Admin\AppData\Local\Temp\nsu1A18.tmp\system.dll

    Filesize

    10KB

    MD5

    24a04541a0d2312e472f8236fd205ea8

    SHA1

    c47eeee6fc23590311f2860d80baa954386a8ce9

    SHA256

    74d7ac9e94305c3d30cfc19279ee73fa891bd5ae8800610dee391d1880825e19

    SHA512

    65e061d2776bc0db53ea8aa35fb50152818c74fa9735f1a5a370315c4dacaf2cb79374ec59174d86c2e87f5b0bb8662f8cee6ff97ae93261c9a9a05bd3cc1adf