Analysis

  • max time kernel
    92s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/08/2024, 02:19

General

  • Target

    b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe

  • Size

    1.2MB

  • MD5

    9313cdb6e8124dec24470307843f02df

  • SHA1

    3de7512e65e91d8d766bc9338ddd2ff91c53c98f

  • SHA256

    b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed

  • SHA512

    54bac79d785ef0fde7f072b084a672b7aaf0d9bd0d1a44c097ce96df1593ecec9b9783d4d3fc634efdbc5b2e091039a6a00fac0f12be5bd49267b784d768bec6

  • SSDEEP

    24576:rXK/nIuooIjkFWpjzwkePXHf+2g0NJMtrrqhv/FamcY:TInIRRjkke/HW4CrO1amcY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe
    "C:\Users\Admin\AppData\Local\Temp\b93c35345e40b1a3cb3170cb341e41a91186141fc70d6cc5078e73c11e3f60ed.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\nse6B5D.tmp\BI.exe
      C:\Users\Admin\AppData\Local\Temp\nse6B5D.tmp\BI.exe { "json_send_time" : "7/8/2024 4:19:24:835" , "product_id_version" : "" , "product_type" : "" , "product_id" : "" , "offer_id" : "3509" , "user_type" : "NULL" , "result" : "Success" , "user_operating_system_bits" : "" , "current_default_search" : "" , "current_homepage" : "" , "current_toolbars" : "" , "attempt_number" : "1" , "is_silent" : "" , "user_ms_dotnet_framework_ver" : "" , "user_acount_type" : "" , "user_ie_version" : "" , "user_default_browser_version" : "" , "user_default_browser" : "" , "user_service_pack" : "" , "user_operating_system" : "" , "revision_number" : "0" , "build_id" : "00000000" , "dm_version" : "1.3.7.7_HF10" , "bundle_id" : "66b0f514-3426-4116-8727-cceb8ef5f35c" , "machine_user_id" : "{9B09EB23-ACB3-4863-9A8F-BF3070610145}" , "send_attempt" : "0" , "channel_id" : "" , "installation_session_id" : "F9A84153-9327-46B2-91E0-8D369CB324D0" , "publisher_internal_id" : "1" , "publisher_id" : "Brothersoft" , "publisher_account_id" : "Brothersoft" , "order" : "1.0" , "phase" : "Init" , "Is_Test" : "0" }
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:3788
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1948 -s 2316
      2⤵
      • Program crash
      PID:456
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 1948 -ip 1948
    1⤵
      PID:668

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nse6B5D.tmp\BI.exe

      Filesize

      81KB

      MD5

      c6606a373ecde7cfd604b9970c84edd0

      SHA1

      2ade77df0b5b02b60a98f60328914c44fb4e0e11

      SHA256

      e30c962b128d554c672d8f332874f43443529fa7c9cc2165affe403f14d83bb6

      SHA512

      8379c676d1fb229cf6661c07b9a14fc782261d6b74b35aff3223fdb9b7fe7afb1b33e6205ae35e420da80a22ed30d5b4f3daa6ef19c975caa7d44ea2a44499b4

    • C:\Users\Admin\AppData\Local\Temp\nse6B5D.tmp\System.dll

      Filesize

      17KB

      MD5

      ea466672af35f704f1e8738ce4381857

      SHA1

      245a02c01302cf0151c07d915f028e3d822846da

      SHA256

      54e5770328d8bc66ae751cba53eed2988cff81d9a0c627e006ee8de01ba71ed3

      SHA512

      619619a5fca42129087b597ef8ff3acb6f423e5c0f6add72d6c2709e6018c66933e16678dcc6e5716f191763cb23929f7cd8ae700f8c919bfa08fad8193dede2

    • C:\Users\Admin\AppData\Local\Temp\nse6B5D.tmp\WebApp\Js\API.js

      Filesize

      9KB

      MD5

      0c1797a7fe8c65cf36ca5bc35aad0ff7

      SHA1

      b2754700c45211e641a59c1ddf55f47d55d43bdc

      SHA256

      85ec98a0fc8ff6c202e0a01142814a5a5438a71636a4025a2a8506cc7b22edba

      SHA512

      76e5eefc894f815099e8360d89253505b8f29974b71d63e0a5e0636e6db9f8793bf11e992140b89d478a856402741222ad0bf2acff72f95d13fb60b370b13231

    • C:\Users\Admin\AppData\Local\Temp\nse6B5D.tmp\WebApp\Js\json2.js

      Filesize

      3KB

      MD5

      9b8cf1c97726c080629c98ddec68bebd

      SHA1

      5d764a5bc2e5cbb5f2569336e4c0c5f472d07f35

      SHA256

      1b6c626d6a600be68b11133c7bcd32fbcc8015951037bb36beaa067914367715

      SHA512

      67c590d216e73d0dd58974567dc248e0adb363c59e318efe1e715960a38220c1cfb98328cdb69941888f9e039d60980fd1fcf11084498fcb46f80c135cb60d24

    • C:\Users\Admin\AppData\Local\Temp\nse6B5D.tmp\WebApp\Loading.htm

      Filesize

      2KB

      MD5

      ae7d8dbeda4f6376cac9fc1cbc11a0e8

      SHA1

      81e4d2b55dcff72073e77b2b9017bbed2f0d511c

      SHA256

      83e84faa4aadddd16ba2602aa6dd113c8bc6b5d5d9606d90552af16d77f5ead2

      SHA512

      b68a696eb672e8f23c36c5e56ce37a2cf48da86027abe2c250110974d1c4811322139117004cea3ba5836638fba19a73788be01a83cc1099bdf01bde3f3982fa

    • C:\Users\Admin\AppData\Local\Temp\nse6B5D.tmp\inetc.dll

      Filesize

      29KB

      MD5

      392f88a1357c739c0825d4fa26fb5286

      SHA1

      02646547510dcfa5e44d461ae0fa50a2273f1010

      SHA256

      66d111ed5526e6c43956ea615254bf140eee4c3f07521ee9a1d6f6e760821949

      SHA512

      79909b909aac3f1a7fb36ee7b3702877b1bf588821df1a0aedcb0f033ff6087dd22ea38408a1505e86c8a300e6b32309924bee901d31f92cf15d697b9a9dcce5

    • C:\Users\Admin\AppData\Local\Temp\nse6B5D.tmp\webapphost.dll

      Filesize

      705KB

      MD5

      0ce8403515ce7835755e23241f833eb6

      SHA1

      a2bcbb0cc429598dbfe74647d72908c7a7ffcfc2

      SHA256

      244d24ccdd4cda723c16d0b47a8c0f42c74b33280c6a7c628010e14c894d10cc

      SHA512

      924e4c9966c50338e9ed2cd93a093c03e6665ec09dbc1722e78edfbd048f0d2f2b637c99eb8abf9e35608eb63bbc890292dbbb7d3b5b175f6e71c967aebe5993

    • C:\Users\Admin\AppData\Local\Temp\nsf6C48.tmp\inetc.dll

      Filesize

      28KB

      MD5

      dbcd04e7c6a999318e15345ee807be40

      SHA1

      0f62900856b3c57c595efd83677d0d78f54dfe70

      SHA256

      b218830ef6006dd1ca5bfde770c859b5f4dcd01a9636b32355340d16dcc34546

      SHA512

      c56af6635032896b60235975226e911d104f59171aac9a8dd7a339e7c63a110737d14670320e7e1dddc210f7a0d35dccf949932f67c0946048c256e1b4064c1e