Analysis

  • max time kernel
    53s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    19-08-2024 20:37

General

  • Target

    Installer.exe

  • Size

    1.4MB

  • MD5

    7eaaaa8fcc415db545f4cde72ad083c0

  • SHA1

    9d294d1f61147dfe82cb30d8b6aa4c978ed3a609

  • SHA256

    a105ae6db94ceb063d8e0019207bd08642d3d434a8217e3fe833b020bd6e6170

  • SHA512

    cfff393947a65ba9f043bfbbddbeb4d2c4e8289a561f65f25c0294f7aa36367782b163ad9b19fe407beb2bfd9aec019b5cdb9293228552fc7a2a857316b774d5

  • SSDEEP

    24576:byeIaZhac1XXDN0rKOWN8O3b0/3GhiIAzPU:b6StnDN0rKOWN8O3b0/3GhiIAzP

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 39 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 49 IoCs
  • Suspicious use of SendNotifyMessage 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Installer.exe
    "C:\Users\Admin\AppData\Local\Temp\Installer.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:2372
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2708

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Roaming\d3d9x.dll

    Filesize

    503KB

    MD5

    639880dff7a53242f9d91f8a790ead09

    SHA1

    55795698202ca6b9712831234e9e10c99a2ec3b3

    SHA256

    bd1751c666e41ca2bde9c2ffbb09b08acc9a5eb46ecfb0a028a258573911d881

    SHA512

    22446fd4a0a0fc0a3101c63874db3fea2b8a91d30d53e20795a839fbcb37ca7da251fe618127fb619e7fd4d729383d98b8aed87105b10d9395c1166b8e2b6810

  • memory/2372-0-0x000000007462E000-0x000000007462F000-memory.dmp

    Filesize

    4KB

  • memory/2372-1-0x0000000000080000-0x00000000001F0000-memory.dmp

    Filesize

    1.4MB

  • memory/2372-6-0x0000000074620000-0x0000000074D0E000-memory.dmp

    Filesize

    6.9MB

  • memory/2708-7-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2708-8-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2708-9-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2708-10-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB