Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    07/08/2024, 11:59

General

  • Target

    javlonbek_bobojonov_cci_com_uz\Documents\Документы из старого компьютера.exe

  • Size

    1.6MB

  • MD5

    5c56d38b2ed1bf274b956819ae22ac20

  • SHA1

    69cc3ae68be863506a75ae6a5ae1a1b2c83aa7bc

  • SHA256

    128289f6ed00489dd2285af8432b69124324ccfbdb2d98d67e0b71040d1605ad

  • SHA512

    2bcb54d6c0b13cc161d4895b8d25f7ac78a33c00e0b01c39325aceb023dd0542298e24de0f2c08901eeb87851796316b387a36fabe791dfff672388f28982ddd

  • SSDEEP

    49152:7VePJGQlzFTi9Z7XMZLzOBNXW1hJ3kVimFOqinPc:7VyzpifXiLzCNXW/ehFOnPc

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 31 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\javlonbek_bobojonov_cci_com_uz\Documents\Документы из старого компьютера.exe
    "C:\Users\Admin\AppData\Local\Temp\javlonbek_bobojonov_cci_com_uz\Documents\Документы из старого компьютера.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:3044

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\bassmod.dll

    Filesize

    9KB

    MD5

    780d14604d49e3c634200c523def8351

    SHA1

    e208ef6f421d2260070a9222f1f918f1de0a8eeb

    SHA256

    844eb66a10b848d3a71a8c63c35f0a01550a46d2ff8503e2ca8947978b03b4d2

    SHA512

    a49c030f11da8f0cdc4205c86bec00653ec2f8899983cad9d7195fd23255439291aaec5a7e128e1a103efd93b8566e86f15af89eba4efebf9debce14a7a5564b

  • memory/3044-0-0x0000000000400000-0x000000000075A000-memory.dmp

    Filesize

    3.4MB

  • memory/3044-4-0x0000000000400000-0x000000000075A000-memory.dmp

    Filesize

    3.4MB

  • memory/3044-7-0x0000000006610000-0x0000000006612000-memory.dmp

    Filesize

    8KB

  • memory/3044-8-0x0000000000400000-0x000000000075A000-memory.dmp

    Filesize

    3.4MB