Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 01:29
Static task
static1
Behavioral task
behavioral1
Sample
98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe
Resource
win10v2004-20240802-en
General
-
Target
98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe
-
Size
3.7MB
-
MD5
188f24d52a3f17cf472f0b7860612c58
-
SHA1
0fec989f098085c68be25fc48d366808aaac610a
-
SHA256
98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7
-
SHA512
bd359f6061810c361d61e023b60ee4c9143216c40bd89ca8c38a02f8a19ea325998dc7f0e7cfed4c948b80215b973cb54bb9209d067f09233a5084c79ced8356
-
SSDEEP
98304:cVOXXUzpyl/iMcLtN4LS8dHxbuBTYoVXKhyRH0BwMX:0Vzpl4L7dHjo4hyRH7+
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2200 98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe 2752 scr_previw.exe 2576 scr_previw.exe -
Loads dropped DLL 7 IoCs
pid Process 2616 98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe 2200 98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe 2200 98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe 2752 scr_previw.exe 2752 scr_previw.exe 2576 scr_previw.exe 2036 cmd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2576 set thread context of 2036 2576 scr_previw.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scr_previw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scr_previw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2752 scr_previw.exe 2576 scr_previw.exe 2576 scr_previw.exe 2036 cmd.exe 2036 cmd.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2576 scr_previw.exe 2036 cmd.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2200 2616 98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe 31 PID 2616 wrote to memory of 2200 2616 98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe 31 PID 2616 wrote to memory of 2200 2616 98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe 31 PID 2616 wrote to memory of 2200 2616 98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe 31 PID 2200 wrote to memory of 2752 2200 98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe 32 PID 2200 wrote to memory of 2752 2200 98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe 32 PID 2200 wrote to memory of 2752 2200 98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe 32 PID 2200 wrote to memory of 2752 2200 98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe 32 PID 2752 wrote to memory of 2576 2752 scr_previw.exe 33 PID 2752 wrote to memory of 2576 2752 scr_previw.exe 33 PID 2752 wrote to memory of 2576 2752 scr_previw.exe 33 PID 2752 wrote to memory of 2576 2752 scr_previw.exe 33 PID 2576 wrote to memory of 2036 2576 scr_previw.exe 34 PID 2576 wrote to memory of 2036 2576 scr_previw.exe 34 PID 2576 wrote to memory of 2036 2576 scr_previw.exe 34 PID 2576 wrote to memory of 2036 2576 scr_previw.exe 34 PID 2576 wrote to memory of 2036 2576 scr_previw.exe 34 PID 2036 wrote to memory of 1180 2036 cmd.exe 36 PID 2036 wrote to memory of 1180 2036 cmd.exe 36 PID 2036 wrote to memory of 1180 2036 cmd.exe 36 PID 2036 wrote to memory of 1180 2036 cmd.exe 36 PID 2036 wrote to memory of 1180 2036 cmd.exe 36 PID 2036 wrote to memory of 1180 2036 cmd.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe"C:\Users\Admin\AppData\Local\Temp\98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\TEMP\{CB072C47-B420-4AAE-9749-51CC37945A1D}\.cr\98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe"C:\Windows\TEMP\{CB072C47-B420-4AAE-9749-51CC37945A1D}\.cr\98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe" -burn.filehandle.attached=216 -burn.filehandle.self=2122⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\TEMP\{4E87C434-71E4-45D0-81A8-E03FB650AFA0}\.ba\scr_previw.exe"C:\Windows\TEMP\{4E87C434-71E4-45D0-81A8-E03FB650AFA0}\.ba\scr_previw.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Roaming\makeAdvancedQGU\scr_previw.exeC:\Users\Admin\AppData\Roaming\makeAdvancedQGU\scr_previw.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe5⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\explorer.exeC:\Windows\SysWOW64\explorer.exe6⤵
- System Location Discovery: System Language Discovery
PID:1180
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
856KB
MD520ab0151b9e18fcb3dea0141f5154e7b
SHA1143d5ec5484c4908d7f864d3dba4cb51587cabf5
SHA25656821ad1ee371202ba13cb6dce2f6a0e64c04fc37c4594f3344257b673285a23
SHA512ba42e5f9607a8f5b3351fde193dea84a9ce7e4a3cea6451b84a8eeec77911aab0f34577b287db6877ce5b2d9621d301ce784bd1e0e596ff276d9bd2d0fc8e815
-
Filesize
66KB
MD5d287578542c8e1042e228ff517584d62
SHA1b496c8c0ee89e3ee3d86e99b22b0cc6a4518c8a6
SHA2565e12046a7555aa5259703ed6910fbc969826dafdcde848fad710eb952960718c
SHA5123c1015bbbd54d7960e800eb5a55e40e31670c91a2b63e9521cb73314bf9d10d535ee3b37fbf1cd83a46037cb128682f5eafbb873b1001ed07d92b9adf049415b
-
Filesize
614KB
MD578bd91f9ad6c1a9813fca8bd17329bbe
SHA164a2ad004e23ccfd7325618e7f4d2be303bf71bd
SHA25636c4e6886ff20758e6fcdc83a0714961a3454b861b2db1a8c7001f3f0fa06833
SHA5128927b01237f05ca91117e1d0d06c906ff723d9a917b337594b3092999d8808febfca5a27f9e860027d9d832ef1f770aceda714217bfe101bb2ec064c7b3d6437
-
Filesize
526KB
MD5edffaeecf1d2be26df6ca2e455030dad
SHA11e9e96910d2599ae2c3ace86780236fa6801397d
SHA256843cb536456a0bdf78dfcfd04a45575f0b2b231e12c8a26085437712f121fa4c
SHA51274626114a098af8c384bbcc162e569c10b8cba32fe26b48080322cc7f5701e3fd6a7b8a5bc52fe628a110d4dbaf3bccfc1691d799c75003793519e0d962d1be9
-
Filesize
1.9MB
MD5d0253aed34e4ed3c60b00a238edac4c9
SHA1151c0e2832cb0437bcec96ef0310de6cf5584358
SHA256790fde0ac7273303db48f501789370b0f2918d24381c9d4fca5d6f63e81a1241
SHA51276d7a2f65f5ace8678a03479903667729cfa468c4aa1f7501dbb3dff110544786a19758de5f98a553cd9ea088cbe03dda9cb215401e9b037cf5ce0eebd463972
-
Filesize
2.2MB
MD5d9530ecee42acccfd3871672a511bc9e
SHA189b4d2406f1294bd699ef231a4def5f495f12778
SHA25681e04f9a131534acc0e9de08718c062d3d74c80c7f168ec7e699cd4b2bd0f280
SHA512d5f048ea995affdf9893ec4c5ac5eb188b6714f5b6712e0b5a316702033421b145b8ee6a62d303eb4576bf8f57273ff35c5d675807563a31157136f79d8a9980
-
\Windows\Temp\{CB072C47-B420-4AAE-9749-51CC37945A1D}\.cr\98cac6ef1484e379d2496f9a28b8c5077abab866e3977a6dfdd538b7817b65b7.exe
Filesize3.0MB
MD5c90969b61fa601af3b7fa9b955f1133b
SHA13ffb38c61ef331cf0557cdc18819cc192d565ab7
SHA2560c71659a7e9f2a16be4252a166ac7d9bc75177a3f531f03ea91b3851ae819915
SHA512bb8ffdec9d17f74306fed12a221a7c04bffb8bb931f354471222b315b553da983aa32347fac4304ba32fe67a3c8ab020435e621acec21288212a77fa585909b2