Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    10/08/2024, 01:24

General

  • Target

    af520d90a87fe68f49daf5bb70ca24c13927c3e287f90426528c1de608fc7aa9.exe

  • Size

    225KB

  • MD5

    a95ae0adb4beabc7dd892cb6802db56b

  • SHA1

    7775138e67736dce1db6c3a23c3d54314c62ce2b

  • SHA256

    af520d90a87fe68f49daf5bb70ca24c13927c3e287f90426528c1de608fc7aa9

  • SHA512

    433a7ecf471c2a577858f53420f8ca9b898a8041f7fb26e29a385b6ed8663c014d67893dcd9124928ab8f8d17266063d6f774517cf84309e21af4f322cda33f1

  • SSDEEP

    3072:sSsdVRsAXg7M1Y3nz520NMobOV7NQKBlcB:sndVRsAXg4C3z520NzMNMB

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 10 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\af520d90a87fe68f49daf5bb70ca24c13927c3e287f90426528c1de608fc7aa9.exe
    "C:\Users\Admin\AppData\Local\Temp\af520d90a87fe68f49daf5bb70ca24c13927c3e287f90426528c1de608fc7aa9.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:588
    • C:\Users\Admin\AppData\Local\Temp\847.pif
      C:\Users\Admin\AppData\Local\Temp\847.pif ////DAEMON
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Enumerates connected drives
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      PID:2696
      • C:\Users\Admin\AppData\Local\Temp\af520d90a87fe68f49daf5bb70ca24c13927c3e287f90426528c1de608fc7aa9.exe
        "C:\Users\Admin\AppData\Local\Temp\af520d90a87fe68f49daf5bb70ca24c13927c3e287f90426528c1de608fc7aa9.exe"
        3⤵
        • Executes dropped EXE
        PID:1800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\af520d90a87fe68f49daf5bb70ca24c13927c3e287f90426528c1de608fc7aa9.exe

          Filesize

          25KB

          MD5

          0f47684c213a9a4e77e9cb5cd3a1c70d

          SHA1

          02c2faac5885753b675d7ef37f0915e692ba72c5

          SHA256

          1e09efa45db40fe1803e421ef090b82494600cbad1a5184be4b7b4158b62b642

          SHA512

          1a020e0dbac29445cacc2b83eae58846cce4a4f1e07505db64b88add3c8aeec10c6c80e94f82f48eab87149ffd5f74f0964331dc4e48522224dfa05fddb01f1c

        • \Users\Admin\AppData\Local\Temp\847.pif

          Filesize

          200KB

          MD5

          ec0511367b2cebe37119a64f93b94248

          SHA1

          e19d3339925614f9e58f125ae64b70e4596029e3

          SHA256

          f1534681937c6e6d6ec933e370bec415e3241590cb43c6bc95a796be922846ab

          SHA512

          2bb9360991f0d757bedca029c77a37a9ff745dfcbc7e8a6998d38757ab279d6a7fe75e82dfa7e461105ae592681f4b7c8ae1eb549059b993f446e0643d1643c3