Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 02:42

General

  • Target

    cb447d4ea9f3acad82a9bc33e8204790cc7bf171c7c6eb20f90dcf0ac7694817.exe

  • Size

    738KB

  • MD5

    7fa2145bdd092b9638cdd5a7ef64b182

  • SHA1

    e7b283cfc602183f2b8e470673195346683a9400

  • SHA256

    cb447d4ea9f3acad82a9bc33e8204790cc7bf171c7c6eb20f90dcf0ac7694817

  • SHA512

    b8e94c8476115b1c8687c50296340f19931999796d643bb69999120f76cafd49a3bbe4e5b62374fc53dde078e77309f3a49619081ebd221f3246bd4fe18b2d04

  • SSDEEP

    12288:SmgDeFtjeLR7l0qB+5RWaGpO6V28MXyM8dpbRg42FK/Py6Xk8TV6ghR5AtP:nyLR7CqB2WtO6VPuyM89/G0PfRBm

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cb447d4ea9f3acad82a9bc33e8204790cc7bf171c7c6eb20f90dcf0ac7694817.exe
    "C:\Users\Admin\AppData\Local\Temp\cb447d4ea9f3acad82a9bc33e8204790cc7bf171c7c6eb20f90dcf0ac7694817.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2720

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\Music\glenna.lnk

          Filesize

          958B

          MD5

          785e9f5e750296e2bc6049faa462a0c9

          SHA1

          b11064763074258efd13b91403a4a0d8bf2fa63d

          SHA256

          9dc772362431ce13a6a4e9dc618016b39811b582c67c86e927474ac808a0e415

          SHA512

          f2d6cbc81418572bf6cec655e7328732ebdf9a5c07e3a224a6519f44d728917c65451e5b81cc0757213e82abec44cc41d0185f6b27000e377033ac3625b19a00

        • \Users\Admin\AppData\Local\Temp\nsy7B39.tmp\System.dll

          Filesize

          11KB

          MD5

          3f176d1ee13b0d7d6bd92e1c7a0b9bae

          SHA1

          fe582246792774c2c9dd15639ffa0aca90d6fd0b

          SHA256

          fa4ab1d6f79fd677433a31ada7806373a789d34328da46ccb0449bbf347bd73e

          SHA512

          0a69124819b7568d0dea4e9e85ce8fe61c7ba697c934e3a95e2dcfb9f252b1d9da7faf8774b6e8efd614885507acc94987733eba09a2f5e7098b774dfc8524b6