Analysis

  • max time kernel
    141s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    23/08/2024, 21:20

General

  • Target

    5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe

  • Size

    176KB

  • MD5

    14d0ff15f0af156ac70bfe66d080aadb

  • SHA1

    9c372cdd1ee5925efb1828d399a05a0bc755db2f

  • SHA256

    5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2

  • SHA512

    1aa7a99b3d586ee0044df6a3d2d8b00b3fffdf35730d8661df6e0a3070db1d76396e10f690e40aa1d0f0b31443c99cb871f4f0491aa284c31fcccd895f679e8e

  • SSDEEP

    3072:H86wLHW98aGEbxeE5hf1jNi+FnA8PJi7K9tOa9txNoK/Gm52222222222222:lwK97FbwEFBxruKrOarxNP

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • UPX packed file 6 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 28 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe
    "C:\Users\Admin\AppData\Local\Temp\5bf51f07737d2ade121fffa2a77e4d582d3adeb68d39d1c4bdd8a247c51e0dd2.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2028
      • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe"
        3⤵
        • Executes dropped EXE
        PID:2888

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\SearchIndexerDB.exe

    Filesize

    176KB

    MD5

    fa39cb92cc4b8ce5cf4321ec0ac0aeac

    SHA1

    9be47b3775218f9c8b0504e7062481b15dceb193

    SHA256

    b75e84219e0d23bcfc057e7c83c17fd34f38447238ae49dfbd323ca689aa1836

    SHA512

    9d819d56e8bdc5f573288f3253b02b47834c3a12498daf99da144689e6b60a1dbc816312b94d862451b2cb9a6c3da56aabaadfdc3c233e0f5e0e8f34ce1830ee

  • memory/1668-0-0x0000000000E10000-0x0000000000E78000-memory.dmp

    Filesize

    416KB

  • memory/1668-27-0x0000000000E10000-0x0000000000E78000-memory.dmp

    Filesize

    416KB

  • memory/1668-22-0x00000000030C0000-0x0000000003128000-memory.dmp

    Filesize

    416KB

  • memory/1668-20-0x00000000030C0000-0x0000000003128000-memory.dmp

    Filesize

    416KB

  • memory/1668-15-0x0000000000C70000-0x0000000000C80000-memory.dmp

    Filesize

    64KB

  • memory/2028-29-0x0000000001150000-0x00000000011B8000-memory.dmp

    Filesize

    416KB

  • memory/2888-28-0x0000000001150000-0x00000000011B8000-memory.dmp

    Filesize

    416KB