Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-08-2024 02:36

General

  • Target

    bab3d853dad54afacfa2515e196720038f1b943bc2a69fe1a88c759d36ebc0f3.exe

  • Size

    395KB

  • MD5

    6752189a9010afc8ff8304c8f279ea95

  • SHA1

    b24f370e26a02d2de9942ae201203beeb40cfe4d

  • SHA256

    bab3d853dad54afacfa2515e196720038f1b943bc2a69fe1a88c759d36ebc0f3

  • SHA512

    38a358fb2c74145ad70ec5319dd6d5d895c954be0e9019182533a471495824ad210622cce4d3b268b47bd6db3f35782377bab96edd0f7eab8285f2e8074ec2dd

  • SSDEEP

    6144:4jlYKRF/LReWAsUyuR02CRuSmTSXG9UQDsPuSixvgd2PtZN8ihrxDik0z2/C7eV:4jauDReWESSSysmSsDik0q

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bab3d853dad54afacfa2515e196720038f1b943bc2a69fe1a88c759d36ebc0f3.exe
    "C:\Users\Admin\AppData\Local\Temp\bab3d853dad54afacfa2515e196720038f1b943bc2a69fe1a88c759d36ebc0f3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4476
    • C:\ProgramData\ahuowi.exe
      "C:\ProgramData\ahuowi.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:4128

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Documents and Settings .exe

    Filesize

    395KB

    MD5

    d171dd6a9926998876a253d89ce08dc2

    SHA1

    93412674450a9f3ee4b96023de4db41e713c5dbb

    SHA256

    8cac88f7e3e47b3f28a3aec5bf0e3295d26eebdc41fd2daa81aa6659ede4aa40

    SHA512

    e99a0a902082de4c0fa932b18baa9ffac72d9af9194072c9c510a216818725761b4bebfc7cc4121a5945a7d1f9bb2c5d63b2d24dceea52eb934cc974a33b808e

  • C:\ProgramData\Saaaalamm\Mira.h

    Filesize

    136KB

    MD5

    cb4c442a26bb46671c638c794bf535af

    SHA1

    8a742d0b372f2ddd2d1fdf688c3c4ac7f9272abf

    SHA256

    f8d2c17bdf34ccfb58070ac8b131a8d95055340101a329f9a7212ac5240d0c25

    SHA512

    074a31e8da403c0a718f93cbca50574d8b658921193db0e6e20eacd232379286f14a3698cd443dc740d324ad19d74934ae001a7ad64b88897d8afefbc9a3d4e3

  • C:\ProgramData\ahuowi.exe

    Filesize

    258KB

    MD5

    636a8a6938af318d67a81f50d3c54bb0

    SHA1

    c794081e36f6ecedad1f2e2145dacdb237c49bf9

    SHA256

    a1b74ea09760afc01bb4892f4117609db1a54cbd24e8ce2016e00187ed968722

    SHA512

    c01d26e63295b15fae61401953a50ac9c7f40595a5b994df51515ca216ecac8ab04290c3daf1a6379f27e19c07ea585ead5381ebb68896bd823832addb4e1ba3

  • memory/4128-130-0x0000000000400000-0x0000000000448000-memory.dmp

    Filesize

    288KB

  • memory/4476-0-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/4476-1-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB

  • memory/4476-9-0x0000000000400000-0x0000000000474000-memory.dmp

    Filesize

    464KB