Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26-07-2024 18:01

General

  • Target

    3bfe0bf60a3cf48cd4c914030796deb0N.exe

  • Size

    20KB

  • MD5

    3bfe0bf60a3cf48cd4c914030796deb0

  • SHA1

    ff7bb48583e86d4af5935339486d37f7d42c2407

  • SHA256

    ac9a75da9c85e6fad0ee7252e9ab11dcb714822456ed07d12f159f97a6002deb

  • SHA512

    48ee4b00dcef3cbb7e89ed276fd7034cbd47de98567bbe037aa2cc1bbebc95e5f254a36365155ba4e1b8f03bd0f40d4a7c983b9196b98544c0f87636ba88ac33

  • SSDEEP

    384:OI/t6vqxuhenoPYpr/LjggggggLvggggggggUaoclh:O2tmhSsYvggggggLvggggggggUaocr

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3bfe0bf60a3cf48cd4c914030796deb0N.exe
    "C:\Users\Admin\AppData\Local\Temp\3bfe0bf60a3cf48cd4c914030796deb0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2964
    • C:\Users\Admin\AppData\Local\Temp\vokfg.exe
      "C:\Users\Admin\AppData\Local\Temp\vokfg.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\vokfg.exe

    Filesize

    20KB

    MD5

    12e8da9212a63d5ee3c58137e2bfc979

    SHA1

    85cc64e57eff7047131550d21c0cbcf32d1cecd1

    SHA256

    c85f978089cc3ed66b5f8265f268b32ff29326201716878fe19201485a94df50

    SHA512

    de4c7bd70a26dba3790b4f1e43b813b48af4e77562c2379ab6065f1cd3fa0853da1c6c24510a60f98b965251e84b6a5d83344ca087f111f8ea00b97dba7dbd50

  • memory/2636-10-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2636-12-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2964-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2964-2-0x0000000000401000-0x0000000000402000-memory.dmp

    Filesize

    4KB

  • memory/2964-9-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB