Analysis

  • max time kernel
    16s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    17/08/2024, 09:28

General

  • Target

    a17d72233158ea870a5dfdcd76a6d980N.exe

  • Size

    534KB

  • MD5

    a17d72233158ea870a5dfdcd76a6d980

  • SHA1

    4aaf2ee0ea5f1f8a3e6f2a7345f308d6d61ab263

  • SHA256

    22d42dfb28230bf63b51ddfe9d5e7301bc696963f9dfc445f0677dba7d2dc332

  • SHA512

    c3c349af9874cd2d80413874e4649aaf2f1ad52e8d1d0ed6af3e480c74527682a53d3bfa640003fe68035505be0adde8b383d0200d9dc6216087cbe953456ae0

  • SSDEEP

    6144:wlj7cMnU+OEXu78n5Qw0tneDA/sqhleIc0HftDrkYY1hj63hgDonsogCh6NEpAFd:wlbU+I85bM3npxYfj63hgD1Ziu

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a17d72233158ea870a5dfdcd76a6d980N.exe
    "C:\Users\Admin\AppData\Local\Temp\a17d72233158ea870a5dfdcd76a6d980N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2768
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devE7EF.tmp!C:\Users\Admin\AppData\Local\Temp\a17d72233158ea870a5dfdcd76a6d980N.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Users\Admin\AppData\Local\Temp\A17D72233158EA870A5DFDCD76A6D980N.EXE
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2572
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devE7EF.tmp!C:\Users\Admin\AppData\Local\Temp\A17D72233158EA870A5DFDCD76A6D980N.EXE!
        3⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        PID:2588

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\A17D72233158EA870A5DFDCD76A6D980N.EXE

          Filesize

          534KB

          MD5

          74e7cdde71339f09185445b7d2d8ca53

          SHA1

          ac98ba8a9f5fdf097480e3802901ed8aee3635a3

          SHA256

          97ed0604beccaed258e7485a08a9166048d637f3e10aae32cbe90ee22ee6d97c

          SHA512

          e87ba7a34b258efdef4cd9058d67f1b83a4fcab92540b86f2acd32b3fa87f479f1dc601f7941469374991d385d5f58cf3aef566833007b9fcc15ded799ef174a

        • C:\WINDOWS\MSWDM.EXE

          Filesize

          80KB

          MD5

          3bad16e6b9791239f0136f664c22ace8

          SHA1

          a92f82890a3ac797b3e5d51840be75376e751a0f

          SHA256

          6b5e6c7bd133a0b2972be2796b0a52f0fa8713d9a9c27d25fdca7e9fcb8d1b17

          SHA512

          ac2b8b671958cfbd4b4966bddbeb3375c6b29089c90364aeb3a3e4836878970e65fa74ca0b5f553a9164b33c630534722306ee4e7b6b36c432e517c503d23dfd

        • C:\Windows\devE7EF.tmp

          Filesize

          453KB

          MD5

          96f7cb9f7481a279bd4bc0681a3b993e

          SHA1

          deaedb5becc6c0bd263d7cf81e0909b912a1afd4

          SHA256

          d2893c55259772b554cb887d3e2e1f9c67f5cd5abac2ab9f4720dec507cdd290

          SHA512

          694d2da36df04db25cc5972f7cc180b77e1cb0c3b5be8b69fe7e2d4e59555efb8aa7e50b1475ad5196ca638dabde2c796ae6faeb4a31f38166838cd1cc028149

        • memory/2588-30-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2704-0-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2704-12-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2768-21-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2768-34-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2812-20-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB

        • memory/2812-25-0x00000000001E0000-0x00000000001FB000-memory.dmp

          Filesize

          108KB

        • memory/2812-33-0x0000000000400000-0x000000000041B000-memory.dmp

          Filesize

          108KB