Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    27-07-2024 01:30

General

  • Target

    9f5d0398d222cf5768e2ab3a81e7d6e15993750fd766009af26b5b799e345a9d.exe

  • Size

    60KB

  • MD5

    21595dab7b5a59c5261963cb3db25623

  • SHA1

    254ab2696f4e9ab660b85e2f3736f3a6fffbec57

  • SHA256

    9f5d0398d222cf5768e2ab3a81e7d6e15993750fd766009af26b5b799e345a9d

  • SHA512

    6be8708d61865ab89445e5a469d33750eb95a2a77e9b96022adcfa8a0db0d451487364d4d8cc7f2df979871137bfe933562ce2ee6bae767f9c0f83a898851286

  • SSDEEP

    768:K9X2bnEpieDA62eIHwhzMnUJ30XbLt3EDEAndeVFipE0FCgKqk3F:IXaEoMA62ZYYUN0rxKOFuE0FCjqkV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9f5d0398d222cf5768e2ab3a81e7d6e15993750fd766009af26b5b799e345a9d.exe
    "C:\Users\Admin\AppData\Local\Temp\9f5d0398d222cf5768e2ab3a81e7d6e15993750fd766009af26b5b799e345a9d.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Users\Admin\AppData\Local\Temp\mtvhits.exe
      "C:\Users\Admin\AppData\Local\Temp\mtvhits.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\mtvhits.exe

    Filesize

    61KB

    MD5

    db0039696c1f81599f1326a9ee203a6e

    SHA1

    a4a84c7c0778b79f97ee704883b5c5fcc11e73c2

    SHA256

    8bcfeb894c1cc1bfc244e104b0e965d9b584887fb2122b9192e23e89cc76fb91

    SHA512

    9fea35a2dc4a729f300116d31ea45b1bb0dbbb9c84b8858719e2f6abe1e177bbac1a1c7ebeb757ed98f9325f134c0cb1239ed674fa2f584d0b7978ebe5469fd3

  • memory/2324-25-0x0000000004000000-0x0000000004005000-memory.dmp

    Filesize

    20KB

  • memory/2416-1-0x0000000004000000-0x0000000004005000-memory.dmp

    Filesize

    20KB

  • memory/2416-0-0x0000000004000000-0x0000000004005000-memory.dmp

    Filesize

    20KB

  • memory/2416-3-0x0000000004000000-0x0000000004005000-memory.dmp

    Filesize

    20KB