Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 07:48

General

  • Target

    752a5fb3a64ec8ddfaede6dffac15070N.exe

  • Size

    987KB

  • MD5

    752a5fb3a64ec8ddfaede6dffac15070

  • SHA1

    dcef912fdb710765b1be3d973c747b6dc5710d86

  • SHA256

    c0043b682d57960006a635e2f31ac075afda681511a6d420cd831278c7a71763

  • SHA512

    4b9171d5ef0d4f6efa1d3af004a57089e852484ef634ccd23ea6dd370119dbc5c89448d708aa3bb8e1a333ba4ab936b5478536e1d479e6e8cab26b1287002bcb

  • SSDEEP

    12288:/1/aGLDCMNpNAkoSzZWD8ayX2MQCw7D0FoWxJpcEi0/3IWV//7cSd6Apt3Kt91EK:/1/aGLDCM4D8ayGMZo8/pjY4oYM

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\752a5fb3a64ec8ddfaede6dffac15070N.exe
    "C:\Users\Admin\AppData\Local\Temp\752a5fb3a64ec8ddfaede6dffac15070N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2636
    • C:\ProgramData\qvjnvn.exe
      "C:\ProgramData\qvjnvn.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    987KB

    MD5

    e67c9e00a63bcb43b6b8e5b1cf0e86f8

    SHA1

    68c133802cb50beca077d23341afc2a5053c8548

    SHA256

    30b17f4bb1868b3f5e585cb3c72f9635a5a3d89715b926a8f5a0ca78f738d133

    SHA512

    e2fda1b68d2268d2da3fdbe6169c9c1dcde180542a66596aa7ea1e3604c5962be0152a25822f0a371955e5e1dfc95b3d11986afc88d88850dbcba0f21ae483ae

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    477KB

    MD5

    2549139ceeb2c40c2ea0aeb04527d833

    SHA1

    fc3ba9c0207120d626d83d9a3281f82c9c617e96

    SHA256

    109a11e4721582eec651e224d8191e0878ebf3adc29c8399eba0217394924041

    SHA512

    fd917d1c67f5eb92cc6a8d1be59e4decb1e0d3bba05074c65a8006650f77655645eb78a7a50f750a7df2ec27e035c0723413140c1c06be8691e770fa0f13c0e5

  • \ProgramData\qvjnvn.exe

    Filesize

    509KB

    MD5

    050d326500aa8eebd310dba30959e7cd

    SHA1

    7b838e54690efb2ff485968f37028d6c0b077371

    SHA256

    ea0cb7ff41fac36cd3c2e24b1e23d29e774c0fc868dcf445149011963e68c05d

    SHA512

    5fa372cdb802d52c5794113453b7bc88a658c0a6a9bd240780cfea952856edcd4dfced56080bb8d94f943443a629f7094f58379fc7e629a242c97c22b4336738

  • memory/2636-0-0x0000000000400000-0x0000000000501000-memory.dmp

    Filesize

    1.0MB

  • memory/2636-14-0x0000000000400000-0x0000000000501000-memory.dmp

    Filesize

    1.0MB

  • memory/2788-133-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB