Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 01:33

General

  • Target

    7ac0e99ec73d37b4d1628493f5ea0d30N.exe

  • Size

    29KB

  • MD5

    7ac0e99ec73d37b4d1628493f5ea0d30

  • SHA1

    ea549e3dbd0503a5b56c40878323df65453ecdd9

  • SHA256

    7f913dbddc0a7f5ec51c49a3fc44db218e70708014ee9afb6b702e4a859a68a1

  • SHA512

    0e8904745c3b074d195e17f27688d4a21f7dfa6885f2cacab6a1f2146f1ad2c5571488dc2a365e2cb1383092f1cb27a3f7aa919914ce682b80f47aec614c3247

  • SSDEEP

    768:AEwHupU99d2JE0jNJJ83+8zzqgTdVY9/xP:AEwVs+0jNDY1qi/qF

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7ac0e99ec73d37b4d1628493f5ea0d30N.exe
    "C:\Users\Admin\AppData\Local\Temp\7ac0e99ec73d37b4d1628493f5ea0d30N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\services.exe
      "C:\Windows\services.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp35B2.tmp

    Filesize

    29KB

    MD5

    3547f34d134068e355dc2425e99b2e6f

    SHA1

    238ff2af6916cb6f94c040121042974bf86f58d6

    SHA256

    2b9cac4c2e641934d4c6758de01590360615f095db7a75109dce606185c5d489

    SHA512

    57e3eb0849075bd93dddeb752a7f80ff8afdad786f5972afd3537453eedd28daf94fa35edae675ad21bff25dba054156d3d431e6515ebb7283eea880abec6a3e

  • C:\Users\Admin\AppData\Local\Temp\zincite.log

    Filesize

    352B

    MD5

    59abe345f2e22a1eb48e7d9b3a79a020

    SHA1

    56c8e50b5380e94bb8d0e393e2a42e2de73425f8

    SHA256

    443131999067f1b7237b7954df78cd8cb514c4633d8f140e7d5a273d592aae29

    SHA512

    9c4b1739b682e92d49d4bb6fe71ed59fb884eb39ca1187d28051f0508d11144d31e290685725dec406e8f469f466abbbad04563dd467d7c6d6cd0de67bc51308

  • C:\Windows\services.exe

    Filesize

    8KB

    MD5

    b0fe74719b1b647e2056641931907f4a

    SHA1

    e858c206d2d1542a79936cb00d85da853bfc95e2

    SHA256

    bf316f51d0c345d61eaee3940791b64e81f676e3bca42bad61073227bee6653c

    SHA512

    9c82e88264696d0dadef9c0442ad8d1183e48f0fb355a4fc9bf4fa5db4e27745039f98b1fd1febff620a5ded6dd493227f00d7d2e74b19757685aa8655f921c2

  • memory/2196-0-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2196-16-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2196-46-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2196-74-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2196-23-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2196-70-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2196-68-0x0000000000500000-0x0000000000510200-memory.dmp

    Filesize

    64KB

  • memory/2196-10-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2196-4-0x0000000000220000-0x0000000000228000-memory.dmp

    Filesize

    32KB

  • memory/2472-17-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2472-42-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2472-47-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2472-40-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2472-35-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2472-30-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2472-69-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2472-71-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2472-28-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2472-22-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB

  • memory/2472-75-0x0000000000400000-0x0000000000408000-memory.dmp

    Filesize

    32KB