Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 00:29
Static task
static1
Behavioral task
behavioral1
Sample
3bbf562527e29091bb75e829c2992850N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3bbf562527e29091bb75e829c2992850N.exe
Resource
win10v2004-20240709-en
General
-
Target
3bbf562527e29091bb75e829c2992850N.exe
-
Size
78KB
-
MD5
3bbf562527e29091bb75e829c2992850
-
SHA1
c9533421ce13b9b8e167544b0862414502813a95
-
SHA256
eee6b012e88a2c757fcdadfdc681e5c6ab2f748f84b8b1e8037340b1b8a2104d
-
SHA512
3d90b6094883356d8e6dda649bab6e553ce5b08cadd8316e390ee343b2e74732531af0e7b685707b7a839da5656f73d7bbf7326299e4d7f8018bce425aa480eb
-
SSDEEP
1536:5csHY6uaJtZAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qt59/a1f5:asHYI3ZAtWDDILJLovbicqOq3o+n59/O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
tmpB3D5.tmp.exepid process 2708 tmpB3D5.tmp.exe -
Loads dropped DLL 2 IoCs
Processes:
3bbf562527e29091bb75e829c2992850N.exepid process 2388 3bbf562527e29091bb75e829c2992850N.exe 2388 3bbf562527e29091bb75e829c2992850N.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
tmpB3D5.tmp.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmpB3D5.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
3bbf562527e29091bb75e829c2992850N.exevbc.execvtres.exetmpB3D5.tmp.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bbf562527e29091bb75e829c2992850N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpB3D5.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
3bbf562527e29091bb75e829c2992850N.exetmpB3D5.tmp.exedescription pid process Token: SeDebugPrivilege 2388 3bbf562527e29091bb75e829c2992850N.exe Token: SeDebugPrivilege 2708 tmpB3D5.tmp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
3bbf562527e29091bb75e829c2992850N.exevbc.exedescription pid process target process PID 2388 wrote to memory of 2568 2388 3bbf562527e29091bb75e829c2992850N.exe vbc.exe PID 2388 wrote to memory of 2568 2388 3bbf562527e29091bb75e829c2992850N.exe vbc.exe PID 2388 wrote to memory of 2568 2388 3bbf562527e29091bb75e829c2992850N.exe vbc.exe PID 2388 wrote to memory of 2568 2388 3bbf562527e29091bb75e829c2992850N.exe vbc.exe PID 2568 wrote to memory of 2268 2568 vbc.exe cvtres.exe PID 2568 wrote to memory of 2268 2568 vbc.exe cvtres.exe PID 2568 wrote to memory of 2268 2568 vbc.exe cvtres.exe PID 2568 wrote to memory of 2268 2568 vbc.exe cvtres.exe PID 2388 wrote to memory of 2708 2388 3bbf562527e29091bb75e829c2992850N.exe tmpB3D5.tmp.exe PID 2388 wrote to memory of 2708 2388 3bbf562527e29091bb75e829c2992850N.exe tmpB3D5.tmp.exe PID 2388 wrote to memory of 2708 2388 3bbf562527e29091bb75e829c2992850N.exe tmpB3D5.tmp.exe PID 2388 wrote to memory of 2708 2388 3bbf562527e29091bb75e829c2992850N.exe tmpB3D5.tmp.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bbf562527e29091bb75e829c2992850N.exe"C:\Users\Admin\AppData\Local\Temp\3bbf562527e29091bb75e829c2992850N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\d-iqhwla.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB52D.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB52C.tmp"3⤵
- System Location Discovery: System Language Discovery
-
C:\Users\Admin\AppData\Local\Temp\tmpB3D5.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpB3D5.tmp.exe" C:\Users\Admin\AppData\Local\Temp\3bbf562527e29091bb75e829c2992850N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\RESB52D.tmpFilesize
1KB
MD565a6abecd1b8346eac43717cd301ea5c
SHA1cbe64cdf96faf724716d99ed65b3470e287be67e
SHA256195f72361e465656c7ac31cd3004cdb269b7784f1b79941ac72eb03f4fb232fd
SHA512a8090a9970681784ba8bbc8d2fedf2a1db2e715115978308d1556f427c1e47df5a03022f27611532f2b34df677e874b64741e300d93e7419b1c2868b3db43e1a
-
C:\Users\Admin\AppData\Local\Temp\d-iqhwla.0.vbFilesize
15KB
MD52ca221524c5d362254c16d34f1392de5
SHA1d793be5a434b1f4723a8ac1c7747eb28e0834f1e
SHA256b24910e5a74428983981799dccb61a840c503640de32a23032dd5d7880ac7e74
SHA5120f94c7802df340c472c7266a4ee030780bc823a30a6c341ab17d8293178cad49d931722c4e0f9c88a4ddfe9896d460c68e986ab61bedbae64b80d67ba092c3e8
-
C:\Users\Admin\AppData\Local\Temp\d-iqhwla.cmdlineFilesize
266B
MD54fac59e56f24f89c8b8c52573aaceee1
SHA1fc32396aaec9f9a5c2e07158879d69af616f3bad
SHA2567ef4dfc2a6baaef95e3cf2bb6676034a60658ab6631eb7fc00fdd3310d7e5cd8
SHA5126663911e1f4121ccabd050a57e6fdb4e87c43dc9a14c22de7810a6bf99fd675867ecf00b3c6856eb7d28bf2b93c92104f4e0361b4fc935f129754c44ec506c79
-
C:\Users\Admin\AppData\Local\Temp\tmpB3D5.tmp.exeFilesize
78KB
MD5cfae413edae2b13da6de59d61bf913cd
SHA1438dfbaf2ed6558a9310f7ed8e0e430f010c43c9
SHA25602ad03d11a31b83a00710e05e8768a5bfc4046e563421f0780bf5b6243fa703f
SHA51212a439061a89dbbc20de19cefdbccbd9420248d09a07f633ef43758f9c724b2fc38503054608e8385902c3a183657984526ffa5aa70dc389185de9cdf27b5bb9
-
C:\Users\Admin\AppData\Local\Temp\vbcB52C.tmpFilesize
660B
MD59ae0ab9934ca922a0f032d111ced768a
SHA17e5e713164c58ca8d1d350a0f2bb21288afd8b6e
SHA25694ff0ad631bef69e08b5ff2d9bf6f4a3499b51c26492fc0be763bd429405ca53
SHA5126bbfdee42986cc4bb67c5ba50267aad2b42d5d064d7b9604dda3d628a0fc9dc5fef49b84e47e180725bc988159ce800280980b019f15934ef37608ceb4465883
-
C:\Users\Admin\AppData\Local\Temp\zCom.resourcesFilesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c
-
memory/2388-0-0x0000000074DE1000-0x0000000074DE2000-memory.dmpFilesize
4KB
-
memory/2388-1-0x0000000074DE0000-0x000000007538B000-memory.dmpFilesize
5.7MB
-
memory/2388-2-0x0000000074DE0000-0x000000007538B000-memory.dmpFilesize
5.7MB
-
memory/2388-24-0x0000000074DE0000-0x000000007538B000-memory.dmpFilesize
5.7MB
-
memory/2568-8-0x0000000074DE0000-0x000000007538B000-memory.dmpFilesize
5.7MB
-
memory/2568-18-0x0000000074DE0000-0x000000007538B000-memory.dmpFilesize
5.7MB