Analysis

  • max time kernel
    32s
  • max time network
    84s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20-08-2024 06:29

General

  • Target

    964d0cf040d3627b1fb810ae4c9c4a40N.exe

  • Size

    3.0MB

  • MD5

    964d0cf040d3627b1fb810ae4c9c4a40

  • SHA1

    f2d1211d17a38550d9278f281f6d39b37ff8a682

  • SHA256

    40e15b4fa176fe80b124a013d2f6f30769266adebccb0c0ff4965d2eba3d25c3

  • SHA512

    d889d8e94a9e3aafbdc6f6cbba54ee64eb744b3d40f4adbc690a6f5abdb750c7840e0e0c73111e000484b5ee8bb917ab7e4cca4b2a46e7804d00725797bdafa7

  • SSDEEP

    49152:qiH2AaajKHX/Ft0vR+Y1pxsVnmMAnBxbu2ONWWIL2wM8+AtZiti8:HHRawKHPFyvR+2VMETbu2vrSwM8zg

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\964d0cf040d3627b1fb810ae4c9c4a40N.exe
    "C:\Users\Admin\AppData\Local\Temp\964d0cf040d3627b1fb810ae4c9c4a40N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1624
    • C:\Users\Admin\AppData\Local\Temp\OO Software\OO LiveUpdate\Unknown 1724135418\OOLiveUpdateWorker.exe
      "C:\Users\Admin\AppData\Local\Temp\OO Software\OO LiveUpdate\Unknown 1724135418\OOLiveUpdateWorker.exe" -ProgramName "Unknown" -InstalledLocation "C:\Users\Admin\AppData\Local\Temp\\" -WindowRec "367 176"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:3068
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2384

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07A88C01EC98D34B4BDC2AA2BF874C1D

    Filesize

    471B

    MD5

    ccb5dddfea906317fad2672bc36a377a

    SHA1

    c7f85bd450c2b518107bc5cbf29a9b6d408bcb45

    SHA256

    7bce2c110b58e0d2d5ce0fe080ef5afdf068de99da6db8efb6a3f6a04ff9e16c

    SHA512

    1cc19d043215737a5c8b849e221db23f4539d3f16d84843d33b59315b638afa5bac89a2887cb1d9f8a697590808271382effd512ef688d73bf8493c57ecb91ec

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    2KB

    MD5

    58fd856ece8c070d5df6faffe2273c60

    SHA1

    8cc3b05cf38684288a27bf273d94449fd15cab5d

    SHA256

    1efeaf11f4fdaef3a7a15835e2ec5e70330057ade2a4334692630ffdc952555e

    SHA512

    7ef07526ac45e0f7ed24db22db44614f102b88e9642952a9ec2e0bc550e73fe3fccec9754a8a426d1a573d8d9c3d0ae798949a6bfeb204302267870b563d2d17

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    1KB

    MD5

    3a0e611157f1066d08c3e5b273aba714

    SHA1

    0163f166be0b036cfc2b6ce78d59ede05552de17

    SHA256

    20a8d02cfcfd8887394536448dc97c88d49a247a4a933ba7081faec72da8fa8e

    SHA512

    55a387ef662a407ececcba0fca3d0a48e3e9f36eee906684dc78053396915fb5ebe78ea2d1e7ce313001cf9d7b1ea41cda419dc554957d1a4ec80d0fa7e82f00

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07A88C01EC98D34B4BDC2AA2BF874C1D

    Filesize

    480B

    MD5

    b17d87dfa74b9c73bf6e3ecbb8644a5a

    SHA1

    281ad0c04d98d7af0c8e83fc6027c59bf367f2ce

    SHA256

    f494195e42b812445fd2242d52d89da1cfeb400ab1bd11dae99f430d41a886aa

    SHA512

    0d10dfe83924b1b2d0fcc130eab55e174e5bdf1db479572c646527a5e3a8a969343d255233a7b5d18ee18bf93955b19d5f02d3242d237f51bd8a37aad8d9a7c5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D

    Filesize

    488B

    MD5

    20993c1ac12233cc415f6e25f4739699

    SHA1

    fc014dcd172b6d506840bdee806abbccd4f21a8c

    SHA256

    945b8fd8442a6ae83efaa2e5ee099d6ad718d96dd4ef57b145461b87445a0e0c

    SHA512

    176450613665ecff7a0ac75186dc7f9a1f2054255e1e78211feae461e36046f1272b73b667d961df110e02afd4a9d4e0a79357d854befcd941d4536bd83ab403

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    5ea36cc95a5c121fadb2eede1adaee78

    SHA1

    a8f1e645238c88daa300e0947ff29aac212a47e0

    SHA256

    caaeb16a0ec0d822239b09e5406799754fa694a8fffb21211c72f5b30dc2d111

    SHA512

    5ff54d771b3bf56887cdd30af2c9afd2ca6959faef3e378cc04b360cb55c6ba1fa07d035f4d0a54b7c0062b0e99e07ee6230aff166a23c165ec20bb9ef334723

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E

    Filesize

    482B

    MD5

    297d2b6b7d663e0334782da6511a04a9

    SHA1

    ac0b45dacae959bb4c40332ce268b227afbf48b6

    SHA256

    ab65153e04648904acc9caa3acbc4e6bd26275f140711853b88efa2e1de824e7

    SHA512

    262141a969ad35dd87f23a4ef0ecf6cf5d865957711ea872b8e023a4b8581e3114379e68ed9ce6486b5d22fed0de42b107202322cc140c509f7ab5f02002be7f

  • C:\Users\Admin\AppData\Local\Temp\Cab455C.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\OO Software\OO LiveUpdate\Unknown 1724135418\OOLiveUpdateWorker.exe

    Filesize

    3.4MB

    MD5

    a60244c64ce6080a7965d780970e37bd

    SHA1

    e0502440acf407d2a89b440f91d4127be0d7566b

    SHA256

    70a1ccbc632b12e89810717a7b884a964a3a24c14fc43a618564a2f1b17ec0de

    SHA512

    57fd2339b4719e3f45bb114a8e2b10146df6757f4e87b18a2776815c944e5babc594c3ee575bf10dee5dc0b6840534c050c54c4b570dbb6c9369bf2198815086

  • C:\Users\Admin\AppData\Local\Temp\Tar45AD.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b