Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    19/08/2024, 18:53

General

  • Target

    2e35b03ce43d0c162f1823017fb9d890N.exe

  • Size

    146KB

  • MD5

    2e35b03ce43d0c162f1823017fb9d890

  • SHA1

    b3fe52204e068f81cf002b95673b77850b43f493

  • SHA256

    3b47e325a8b07d1f0fc654f353703c3ae90278b595e7e6416ae081489c4b9f88

  • SHA512

    c85cdd949488efd9a00a3b604d803cf3e9d1e2cb22394c71131419d0e7d3c854a610043183e12b8feddb11242653c84a26a9a36bcbd2e1bc41b2eaedcd0d2033

  • SSDEEP

    3072:ABAp5XhKpN4eOyVTGfhEClj8jTk+0hnTm52X+q9ln:3bXE9OiTGfhEClq9gKZq/n

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Drops file in Drivers directory 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e35b03ce43d0c162f1823017fb9d890N.exe
    "C:\Users\Admin\AppData\Local\Temp\2e35b03ce43d0c162f1823017fb9d890N.exe"
    1⤵
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:572
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Program Files (x86)\Com\New1\tansi_minuss.bat" "
      2⤵
      • Drops file in Drivers directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2704
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Com\New1\rg11333i.vbs"
        3⤵
        • Drops file in Drivers directory
        • System Location Discovery: System Language Discovery
        PID:2924
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Com\New1\tu33444i.vbs"
        3⤵
        • Blocklisted process makes network request
        • System Location Discovery: System Language Discovery
        PID:1084

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Com\New1\a1111.dfg

          Filesize

          27B

          MD5

          213c0742081a9007c9093a01760f9f8c

          SHA1

          df53bb518c732df777b5ce19fc7c02dcb2f9d81b

          SHA256

          9681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69

          SHA512

          55182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9

        • C:\Program Files (x86)\Com\New1\rg11333i.vbs

          Filesize

          909B

          MD5

          90e4c6e8c59ccba248ce3e76039a3918

          SHA1

          050d1d3268d4e3dd09dd37bcfb653a9e25b4d69c

          SHA256

          2c6271e4f943f118fc24e2016e3bb3d32f8da2cb041005e6d1a2ec1fd48eb161

          SHA512

          474a826aa64b09109572dc007ff7d377570055a12152a677b72180c846c3d9cbf388e876e6833012c6726ff359379aeada2df0d483e88e020703689067aa2e17

        • C:\Program Files (x86)\Com\New1\s1111f.dfd

          Filesize

          37B

          MD5

          246f4a66337880c8a04b7f1bb7170d17

          SHA1

          313993f01c080c16bf1bd217e3628b122bd12c21

          SHA256

          96391bffd06a3fe72738561868d41deb85ffae9d0ac50f42403ddf485e3707b3

          SHA512

          0f0ec4c759fb2df384e1cbc06ffd1695ed8c46dbbf987389d7647ef511bf9a291129d3a4dc32aecbcaf0690ce9b67708a9cffd6b525bf50824a3041d40c96fe4

        • C:\Program Files (x86)\Com\New1\tansi_minuss.bat

          Filesize

          1KB

          MD5

          5bc734cdff6afd0f122bec204e73f30a

          SHA1

          b74a05237f0ad979ce8a7918f83490a6dd10164e

          SHA256

          949b45692b733e06d06f07877bccace84e41bb59eb5776a884ad1f3def9a39d9

          SHA512

          4dfa24f1678fab25f8e3111f3f00f31137fbeeb51bd871af0c928dce3bf8a99d81334fee76cce61e7ede4c00de29c91d3db5e47e8cf3a7c25fd4342d71c74f64

        • C:\Program Files (x86)\Com\New1\tu33444i.vbs

          Filesize

          212B

          MD5

          41e0643e1afa912bae8e2e6c5c2ce5d7

          SHA1

          cc3a2ad3426194e4f97cb668068401fc89ca466d

          SHA256

          67a56c7874b67a25915426988e5ba5c2f89783c6ee6bf1a4f06a6eab1b4355f1

          SHA512

          db06752452a2b303ddd0372c5395c34208191143c9cf664426211099a6ecb5d5f8541c2b526b67d0ca41d79c3df5463574201aa0a62d5cf6819287da89156118

        • C:\Windows\System32\drivers\etc\hosts

          Filesize

          1KB

          MD5

          96e91b3cb2d6d44ee2a373765f0f400a

          SHA1

          d1248715883b5f0b7310dbbeb16cb631e069e952

          SHA256

          eb371728896f4746eff26836e27a15675927f8b380a0c27db6772672e3b69707

          SHA512

          2c82e90885f5123bcde77d17f2d209ae3a806f60692a8a0a5a68136fe7c9dfc94e2abf944e023e79a4cd72b0b54e0d594fe5ddf207346b944863e402fbc19457

        • memory/572-74-0x0000000000400000-0x0000000000422000-memory.dmp

          Filesize

          136KB

        • memory/2704-72-0x0000000002D80000-0x0000000002E80000-memory.dmp

          Filesize

          1024KB

        • memory/2704-66-0x0000000002D80000-0x0000000002E80000-memory.dmp

          Filesize

          1024KB