Analysis

  • max time kernel
    31s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 18:48

General

  • Target

    105633b40052b78feb053f4273a0abdf2e222bf45646174f2e2abdc7013cba15.exe

  • Size

    126KB

  • MD5

    33fece17c7dfdb9f269e94c7019038f4

  • SHA1

    f3df43912e56988fde9a56919aa9980a3da6cd83

  • SHA256

    105633b40052b78feb053f4273a0abdf2e222bf45646174f2e2abdc7013cba15

  • SHA512

    09ae756f961c21858d56eccfc286e781762ed37e71fd3946e0dedf338c3b08a74c2d9e3db84f61092b235996bc7f60e29cfa450d47a94696a2fce982370535af

  • SSDEEP

    3072:vQIURTXJPeoh+YSZ158zIrTTU2KgXaU+eakO:vsxhhSPZo2vekO

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\105633b40052b78feb053f4273a0abdf2e222bf45646174f2e2abdc7013cba15.exe
    "C:\Users\Admin\AppData\Local\Temp\105633b40052b78feb053f4273a0abdf2e222bf45646174f2e2abdc7013cba15.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    PID:1920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsoA1EC.tmp\InstallationType

    Filesize

    808B

    MD5

    57b73ed78640cb3d1c0d5035b5eb557f

    SHA1

    4e22d8a09712d0091d12a3855a68e2282728173d

    SHA256

    92d3119b5cda9d964599d7a0ef2dd16f34aed5b17b33cb052b916b0a95c471c7

    SHA512

    58b141e26bd4361655f9105773c64ea80b4d9e2543a5cc1ac04f22c0e648cafadb988022e9160ade76832ae7b797d4297b3064c01882b230984257278bdcaf15

  • C:\Users\Admin\AppData\Local\Temp\nsoA1EC.tmp\ShutdownAllow.dll

    Filesize

    3KB

    MD5

    db401847c04d665a6f83dcafdd6ac23d

    SHA1

    bdbdcf5baaedd62d8d3f471693ef99d1fea60d7a

    SHA256

    c6518731ae740494bdd87c53a43086be7f0ce125f728b2860a014235cd56134e

    SHA512

    c204bcd55d87cabfcdb79ca2230ae0e89425f2c7e67b46d3a04937440cdfbbe3d9cafa5e52a8ab5d4539a3af4710ce44624476fa42602edb23cb549aa77ecd71

  • C:\Users\Admin\AppData\Local\Temp\nsoA1EC.tmp\header-install.bmp

    Filesize

    25KB

    MD5

    c8eff9a5cbaf95dbe8195f52eb4d36d2

    SHA1

    91cbe619cc095920c472f089417b7360f051707b

    SHA256

    b998ac8ef27daac68eac451c91392b1ef34b47fb3b412a6a55250ce362ec9358

    SHA512

    2fff71a56c398b7df127c55407da316ff591d4572dcca400bed7fd33291b87bfec41136fc9850a60937724ccac8bf5dab025d701064040199dea4b045ff0de9b

  • C:\Users\Admin\AppData\Local\Temp\nsoA1EC.tmp\inetc.dll

    Filesize

    24KB

    MD5

    eff1d9f80967c384e8d25c5a6369af1f

    SHA1

    1bad344a6f8a991e2017d79113e1e54f0dde32b8

    SHA256

    0537e86a8940e8c516330c1e646bf46cb62d79fc5a9add557c5050b40fa9f346

    SHA512

    cc824bcf581182c072df0e59c4d5af73fd5768215e18585e94d15617cda224763b62bd36a24510766e1bd651da05f024e6b6b9b0eaf3b6371f119c508a5a1e18

  • \Users\Admin\AppData\Local\Temp\nsoA1EC.tmp\System.dll

    Filesize

    11KB

    MD5

    c17103ae9072a06da581dec998343fc1

    SHA1

    b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d

    SHA256

    dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f

    SHA512

    d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f