Analysis

  • max time kernel
    74s
  • max time network
    76s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    03/08/2024, 04:21

General

  • Target

    4c3049f8e220c2264692cb192b741a30N.exe

  • Size

    898KB

  • MD5

    4c3049f8e220c2264692cb192b741a30

  • SHA1

    46c735f574daaa3e6605ef4c54c8189f5722ff2a

  • SHA256

    7f74b2c86e9f5706fc44c8d5093a027d1cd5856006aa80f270efae26d55c9131

  • SHA512

    b13dc855c3c06b56aa9bf181680b69003839adeaf16c5372912004a7bf42882e340c445c58e24e083692b4dcbb15c3e0cf244664458ccdd0dd7668b440277e0a

  • SSDEEP

    24576:juDXTIGaPhEYzUzA0aVuDXTIGaPhEYzUzA0bZB:KDjlabwz9jDjlabwz9dB

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c3049f8e220c2264692cb192b741a30N.exe
    "C:\Users\Admin\AppData\Local\Temp\4c3049f8e220c2264692cb192b741a30N.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2480
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat" "
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1460
      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\clamer.exe
        clamer.exe -priverdD
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:2184
        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\thkdh.exe
          "C:\Users\Admin\AppData\Local\Temp\RarSFX1\thkdh.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          PID:2740
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {0458DA6C-F121-4D07-A86D-470395B77E9E} S-1-5-21-2257386474-3982792636-3902186748-1000:CTBHAMHL\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\ProgramData\eccdejd\usne.exe
      C:\ProgramData\eccdejd\usne.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2684

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\1.bat

          Filesize

          37B

          MD5

          28151380c82f5de81c1323171201e013

          SHA1

          ae515d813ba2b17c8c5ebdae196663dc81c26d3c

          SHA256

          bb8582ce28db923f243c8d7a3f2eccb0ed25930f5b5c94133af8eefb57a8231d

          SHA512

          46b29cba0dc813de0c58d2d83dc298fa677921fd1f19f41e2ed3c7909c497fab2236d10a9ae59b3f38e49cf167964ede45e15543673a1e0843266242b8e26253

        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\clamer.exe

          Filesize

          453KB

          MD5

          fb30b403c1fa1d57fb65dc8b8e00e75c

          SHA1

          161cf9d271aee2d7d2f7a0a5d0001830929c300b

          SHA256

          83d9579e6b71561a9dafbdd309b4dbfaddf816c7ccc25e4672c8d9dfb14b6673

          SHA512

          d0d15e51527bcfad38c01c46b4c43257407ead9c328bc4d48d21c9702c16872e52509e014444e78cd22f1ad96c11a88d281c2a745df0a4ca21243352f879de85

        • C:\Users\Admin\AppData\Local\Temp\RarSFX1\thkdh.exe

          Filesize

          16KB

          MD5

          e7d405eec8052898f4d2b0440a6b72c9

          SHA1

          58cf7bfcec81faf744682f9479b905feed8e6e68

          SHA256

          b63a0e5f93b26ad0eeb9efba66691f3b7e7f51e93a2f0098bde43833f7a24cc2

          SHA512

          324507084bd56f7102459efe7b3c2d2560f4e89ed03ec4a38539ebb71bccdf1def7bc961c259f9b02f4b2be0d5e095136c9efcd5fc3108af3dc61d24970d6121

        • C:\Windows\Tasks\Test Task17.job

          Filesize

          218B

          MD5

          30c2174e5418e3a0a0067ecdca8a29e0

          SHA1

          73ee08de72530d40f99e8a6f92bc075ce376874c

          SHA256

          1333ddcff3e556d62efd086fb10853a544fe3f8e9d59ebc831c9f538aadf1a23

          SHA512

          ed91fefe82558199c5395859c54278ec6ee4c300dd520984b21606ada562b2f94b831dfc36797c26c1848f4067fd3d6d65486740fc7e73e1dcdc33503ffcc266