Analysis

  • max time kernel
    14s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 15:31

General

  • Target

    2360bb0b42650f2feb47a0e988ccc3ea.exe

  • Size

    730KB

  • MD5

    2360bb0b42650f2feb47a0e988ccc3ea

  • SHA1

    0712817e7fabe68e34d67ce4151728d9f2eb8cba

  • SHA256

    5156add523f08eb7eabb51f3ce648d6f93c646bec4c6cee7dd59d95e5b50b2b3

  • SHA512

    d95afaa69795cfa63bed2e22f98bc37eca17402c92a83f062b04b5883ac1cd5be49b6e5653dc8d0e6fb7127e573397ca62f518045795536912526ec4bfd9744d

  • SSDEEP

    12288:AcrNS33L10QdrX6O1nbGnBoX0DWdl3oV52aA8buKO01+0SOP1HvMKhv5KVwCaU0F:jNA3R5drX31bFXOul4qr8bK04BOP1Hvb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 7 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2360bb0b42650f2feb47a0e988ccc3ea.exe
    "C:\Users\Admin\AppData\Local\Temp\2360bb0b42650f2feb47a0e988ccc3ea.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\jystsdf.cmd" "
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:776
      • C:\Users\Admin\AppData\Local\Temp\jdfjdfgj.sfx.exe
        jdfjdfgj.sfx.exe -pluklhpfbsnrsyethnymkdesppodtyuhngfszafugyRhvqxsdfHbgnmeG -dC:\Users\Admin\AppData\Local\Temp
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2856
        • C:\Users\Admin\AppData\Local\Temp\jdfjdfgj.exe
          "C:\Users\Admin\AppData\Local\Temp\jdfjdfgj.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2388
          • C:\Users\Admin\AppData\Local\Temp\jdfjdfgj.exe
            C:\Users\Admin\AppData\Local\Temp\jdfjdfgj.exe
            5⤵
            • Executes dropped EXE
            PID:2972
          • C:\Users\Admin\AppData\Local\Temp\jdfjdfgj.exe
            C:\Users\Admin\AppData\Local\Temp\jdfjdfgj.exe
            5⤵
            • Executes dropped EXE
            PID:1700

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\jystsdf.cmd

    Filesize

    18KB

    MD5

    7e3bf51c4c3a36b47e11430547e25cde

    SHA1

    7a0ee686431fa4580341973c3731ebaaf9a1b86a

    SHA256

    ff026f8db90e85004687be818e5f7479292631773cd032d6fdcc69ff7030b3c5

    SHA512

    05052c720ed921cac145672fc037ac85fa53b70ff6093e53156b8bd45d14cec8ccc65428ab09f89dfaba51d8c2961b02e3c9cf9b5f983d88cd2bf04c5f998a1e

  • \Users\Admin\AppData\Local\Temp\jdfjdfgj.exe

    Filesize

    365KB

    MD5

    03ac3991dbdb18d73bda731e1f9cdf7c

    SHA1

    96ab8e03593bf0591bae31487e89ac6b6e3c3a91

    SHA256

    14294dff13988ad3efe1ef9ca884b98d554a2c94bab76671e8a724d489785059

    SHA512

    1d76a3e1b9e0396bfc9b7a0772c4974161eb215f934cba6e6bc0dddb1c4e67f8e24c68262cadebb591b4ff0743822b001e4afa5d7d3e79cbf2900d3245cbe8a5

  • \Users\Admin\AppData\Local\Temp\jdfjdfgj.sfx.exe

    Filesize

    591KB

    MD5

    9aa2e1f4bd4d6919c533aec18e0c47e9

    SHA1

    62225abcd9442ec735e4a049f5765e514b6be651

    SHA256

    7da2b4bacf0927f5510aee39c8122872f52367dfab528cc77176ee19b70e9fd1

    SHA512

    588ad8b4677f75d319808c167ed1d57a962776d71667f08c0e2373dc153375f2dcf931e0655f1e3fdef1027ba918c742a6b49c06377575ea60a6376e48ffa810

  • memory/2388-37-0x00000000000F0000-0x0000000000154000-memory.dmp

    Filesize

    400KB

  • memory/2388-38-0x0000000000520000-0x0000000000526000-memory.dmp

    Filesize

    24KB

  • memory/2388-39-0x0000000001E00000-0x0000000001E68000-memory.dmp

    Filesize

    416KB

  • memory/2388-40-0x0000000000570000-0x0000000000576000-memory.dmp

    Filesize

    24KB