Analysis

  • max time kernel
    119s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2024 16:14

General

  • Target

    ad7f288c6c3528a5b8508f7bca6c1050N.exe

  • Size

    2.0MB

  • MD5

    ad7f288c6c3528a5b8508f7bca6c1050

  • SHA1

    7e949316c76cfffd93533b49478244738f2a31fe

  • SHA256

    c1764bac71bc705b900e232da0e2c17fdfc94fc3f1d125105785cc3727433886

  • SHA512

    439ad4522557c90cefb651358fcb452adf4c21461a9290791bd9fae27bd796fd17f7761d1ac7d90a67221b9d31673341ea70071db7449bc4efce992b67cfe9c3

  • SSDEEP

    49152:OFUcx88PWPOpX0SF5+9ycUWgm3M4cIHQHkJYXZOT7yGc:O+K88uPCHT+9y9WcqIOPyGc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ad7f288c6c3528a5b8508f7bca6c1050N.exe
    "C:\Users\Admin\AppData\Local\Temp\ad7f288c6c3528a5b8508f7bca6c1050N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1512
    • C:\Users\Admin\AppData\Local\Temp\B886.tmp
      "C:\Users\Admin\AppData\Local\Temp\B886.tmp" --splashC:\Users\Admin\AppData\Local\Temp\ad7f288c6c3528a5b8508f7bca6c1050N.exe C3D486BA651B5123147CFD304F694966E9D3D964FF31943FB8A84C1C4298D6390F226B8D468D20AA1FFA3BD7AC2E8A1993195DCE15B264DA79249DA0716F3172
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\ad7f288c6c3528a5b8508f7bca6c1050N.docx"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ad7f288c6c3528a5b8508f7bca6c1050N.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • \Users\Admin\AppData\Local\Temp\B886.tmp

    Filesize

    2.0MB

    MD5

    246c638979317e7a948cd2b50d117d1e

    SHA1

    3535dac88403b2f1909b7156f2d19edd6390d87f

    SHA256

    e60157466990a2f98a60e1ce52129529b8ae1cb4e640eae15800e50b831e6461

    SHA512

    25300ca89667e6fc85ba287e921ba54f22e8e6181b5f2a2195458b51b7b1c6080251c488053d7e29d82a33078c37219d44212dbd71ba92ac7835e23b9596f2f7

  • memory/1512-0-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/2952-9-0x000000002FC81000-0x000000002FC82000-memory.dmp

    Filesize

    4KB

  • memory/2952-10-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2952-11-0x00000000718ED000-0x00000000718F8000-memory.dmp

    Filesize

    44KB

  • memory/2984-6-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB