Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    02-08-2024 17:07

General

  • Target

    $PLUGINSDIR/shareddlls_install.exe

  • Size

    2.8MB

  • MD5

    4fe8ff7f02020ea655944db5541722f3

  • SHA1

    b5ff619c215529a4531337eef36167051cded658

  • SHA256

    599c63aa0d0496363c7c99217e6c3d941125907cc4ea4c7d5d73c9b54e3deaee

  • SHA512

    f4802d00d46c59882a1e1d3b8c0a43fd2ba4b22819d5417ad81cf4522e796176a920f81a6753e8297d49b3b0e60f3e1c27e4fbff2a6cc100d01cd0a39a75b4e3

  • SSDEEP

    49152:lNXkhjpZr+L6hsoD/cSjvJafJc3eXIeGixJbsf4GQHwFjPfLtv+W3oZYKwL:lZ2XCGyk/cSrJafogfGiK6QFjXLfuYK6

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\shareddlls_install.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\shareddlls_install.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nstFB13.tmp\ioSpecial.ini

    Filesize

    696B

    MD5

    b291c395f21384cf28692eeb56321160

    SHA1

    032a8d4a266128079194c9e1da14338e6cb64312

    SHA256

    cb2352ae0c2318152e1378e98a08ee377d64c8e25e1189109e304e0d6a0b81cc

    SHA512

    5d0f1b4a51571c667c032659718cd934677b8157ceb45a7eaeb1d9533944d3caa4d7f45e05432b1410207e17db92ee188ee0a808f43a632b98db61c0e332abfd

  • C:\Users\Admin\AppData\Local\Temp\nstFB13.tmp\ioSpecial.ini

    Filesize

    735B

    MD5

    dab108d25aa427135c568dab3f1d0b12

    SHA1

    417ad15add44d23f7ae2aec44ee9ee4d5123e356

    SHA256

    e62a4e1fd1006a32f8ac655a1b6290278d6c1206d051d4380a175842c4c45a5d

    SHA512

    d8d13b99c74001ded2ef3cccb4f786ad810ce7de5ca9b8e38d7ba74d7323e81049feaa9493188ee24b0a2619c2a1a77f4dabedc61c6d493073307c3dfe6d0ae6

  • \Users\Admin\AppData\Local\Temp\nstFB13.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf