Analysis

  • max time kernel
    120s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/07/2024, 21:09

General

  • Target

    0920b378e2487691c98ed4f0b874d4d0N.exe

  • Size

    96KB

  • MD5

    0920b378e2487691c98ed4f0b874d4d0

  • SHA1

    2d2330fb1392c804a3cf42b68aa1372a50ba0eb1

  • SHA256

    01e80f0018a49b7ddc030a18a19856bee59f3b071a7f77e4cb54a4f073e17742

  • SHA512

    b16459ec4dc07a3a5440758a3596769592bbcd0dda361cbe3554e87f557c28d977496afa29a4d804458d1b650d5f5090d14d5cc1af6dd312fa76cebc1ea1ae7e

  • SSDEEP

    384:F6eHIAx0pqNgHvRl4/UCC8VcAaYRiUiiV7fhqc45u8gNrLRnkYpZ7E:F6eHIMgPRlUUC151Npquv3Rnk+E

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0920b378e2487691c98ed4f0b874d4d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\0920b378e2487691c98ed4f0b874d4d0N.exe"
    1⤵
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\AOKHY.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "xplorer" /t REG_SZ /d "C:\Windows\xplorer\xplorer.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2812
    • C:\Windows\xplorer\xplorer.exe
      "C:\Windows\xplorer\xplorer.exe"
      2⤵
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:2740

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\AOKHY.bat

          Filesize

          124B

          MD5

          4e6e99d38b1264af2b53a68c7cd6d648

          SHA1

          55ffe17732d1d9c539d702a1311ef9674fe7b3cf

          SHA256

          168d9cdf4849fde3b4817db207e60934b6c877be439289f3fb3a4eb9e4326ff0

          SHA512

          bde21abed1bfc3dbdd6afc83614aa27c3f33dfbb434e139523ac57ecd84875b0e96a241f5828eda0b055f787ec7f95850b0f4ab0ee752ac36484b2bfd78a859d

        • \Windows\xplorer\xplorer.exe

          Filesize

          96KB

          MD5

          8259cfc729162e0df497295a5ac1ba22

          SHA1

          7c177612f6d068aaa7364dd4154e98675eda1c97

          SHA256

          6de5c8f67c02a9b7c894dd3562ffe5d45e3d3588ac0f925d90572b0b02d35f45

          SHA512

          cd2e2b173104b5cd1dbfe53dfaf3cc37429c09ecafaf5d7e6e8fcf701bf3addcd33714b1ed25581fc4fe90f735e35ca8e01ea106adbddb06817b084e7c899d96

        • memory/2740-41-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/2740-45-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/2784-0-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB

        • memory/2784-40-0x0000000001D00000-0x0000000001D18000-memory.dmp

          Filesize

          96KB

        • memory/2784-44-0x0000000000400000-0x0000000000418000-memory.dmp

          Filesize

          96KB