Analysis

  • max time kernel
    141s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/08/2024, 01:46

General

  • Target

    CV.exe

  • Size

    1.2MB

  • MD5

    936f713a0ded9243355db3cb17a0471e

  • SHA1

    11e9cf6facdb4b026dc750430ae62c9f8d6b4d36

  • SHA256

    dd062485ab10c62ace9325bd549f32d4dbf8cdfa0326c83d43a02202857e0d33

  • SHA512

    8330bfc21ca9b3d63db60fb6d0fe203d37b6a1787fbb23fdaa3319a1c6e6e318a73ddec0374562cb36a229a17886665d488edc6dd8f50429bdd101770f7a7ba7

  • SSDEEP

    24576:fqDEvCTbMWu7rQYlBQcBiT6rprG8aXaWzj52utKVpwKcJl04U:fTvC/MTQYxsWR7aXfjt0VpM/

Score
7/10

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • AutoIT Executable 3 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\CV.exe
    "C:\Users\Admin\AppData\Local\Temp\CV.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:4876
    • C:\Users\Admin\AppData\Local\directory\name.exe
      "C:\Users\Admin\AppData\Local\Temp\CV.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:3064
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\CV.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1348

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\aut9F1E.tmp

          Filesize

          280KB

          MD5

          f63ccabfe159775635d5a77e1fc635c0

          SHA1

          3907cc1f1a567629134fa44a001aea4e2b9bedb1

          SHA256

          7bc85b7f72f9a3c9b650d65106fcccc58c680a30da4a98de51cf0b282424b794

          SHA512

          4a109624b4a70b548dbfd2d4afbb48040af9e033f3dd167f7ddbfd46ce44033976f1119976a94f60af6fbcf265a3881ce96f5aee62324ecc12ec13e722dc9e8e

        • C:\Users\Admin\AppData\Local\Temp\peristeronic

          Filesize

          84KB

          MD5

          3733b47a742fed2e4065551f5d89b3bd

          SHA1

          1683eb1918e9c792668dc9b4ed65cad98c8a06cd

          SHA256

          889d8d51d9984a888d5d6535450a91319105222d4b341c2c6ca21ce0ad34c758

          SHA512

          32ce91dcc9448def6848d6e1f72b63907d5c5009303892297be533d8439163629e8eb60fe4a6c9d217ee0af70469c947353aa194a73b5e49e1d397e7e5789b76

        • C:\Users\Admin\AppData\Local\directory\name.exe

          Filesize

          1.2MB

          MD5

          936f713a0ded9243355db3cb17a0471e

          SHA1

          11e9cf6facdb4b026dc750430ae62c9f8d6b4d36

          SHA256

          dd062485ab10c62ace9325bd549f32d4dbf8cdfa0326c83d43a02202857e0d33

          SHA512

          8330bfc21ca9b3d63db60fb6d0fe203d37b6a1787fbb23fdaa3319a1c6e6e318a73ddec0374562cb36a229a17886665d488edc6dd8f50429bdd101770f7a7ba7

        • memory/1348-35-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB

        • memory/1348-36-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB

        • memory/1348-38-0x0000000001200000-0x000000000154A000-memory.dmp

          Filesize

          3.3MB

        • memory/1348-39-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB

        • memory/1348-40-0x0000000000400000-0x0000000000446000-memory.dmp

          Filesize

          280KB

        • memory/3064-33-0x0000000000DA0000-0x0000000000EE2000-memory.dmp

          Filesize

          1.3MB

        • memory/3064-37-0x0000000000DA0000-0x0000000000EE2000-memory.dmp

          Filesize

          1.3MB

        • memory/4876-13-0x0000000000E10000-0x0000000000E14000-memory.dmp

          Filesize

          16KB