Analysis

  • max time kernel
    149s
  • max time network
    94s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 07:20

General

  • Target

    f90856a0deeedef55fccf1386af69280a5ebc72e2179d3c07befb6e978e0caff.exe

  • Size

    1.3MB

  • MD5

    b780e63a22928a85867fbb744c8d7a7a

  • SHA1

    657a87d43d58b46ec3944f3e0543a1882f149e6b

  • SHA256

    f90856a0deeedef55fccf1386af69280a5ebc72e2179d3c07befb6e978e0caff

  • SHA512

    5ca2eba46cc018e41fd3538d4cf5ed9123b21abba4ba760b3562e3571fc191dacb60bd59566c14451c4243a60cd5b9248a84edb193c4ea49854df91d389671ca

  • SSDEEP

    24576:98dvIOVmW6AbPsArkueRKmV3sNlHXdmMDx:9owONbkBuyKmBs7Y2

Malware Config

Signatures

  • Drops startup file 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f90856a0deeedef55fccf1386af69280a5ebc72e2179d3c07befb6e978e0caff.exe
    "C:\Users\Admin\AppData\Local\Temp\f90856a0deeedef55fccf1386af69280a5ebc72e2179d3c07befb6e978e0caff.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2776
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:3008
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe"
        3⤵
          PID:3020

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            b4868f9700e0caa7ffa9d4868f5f0217

            SHA1

            fcc06f48fc9d54d31fb25bf18715a90a1aa305e7

            SHA256

            81aedc306a4ae02c083e3bdc8492d9e31f9fecf805b7f60bb5032e7cec50a4db

            SHA512

            425864858cdec188f2bb2485750e21ddac535ce68bb4823e0aa35f8b01d189468858a30611c24040f6ab214df03cf54211441b5cfd04e3890edcc2bf6a92240c

          • C:\Users\Admin\AppData\Local\Temp\Cab40D7.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe

            Filesize

            1.3MB

            MD5

            0840762720dbcbea9772ed8fc81c58fd

            SHA1

            731f7f6c5b4d7a8d7ab7a56f1f33593168163ed9

            SHA256

            709e9a703d26d637bbd04eb2521c8f0d726d86688a19e45995c6cc4db71fed40

            SHA512

            6753e42fd48b0af7fe7ae87b8eb68b84a459216bee04b7b83bc5da17735cdf7969dc457cf5bb07e056fa69efc548694f9d6f98a4c4fbed3f9fd042e5943864e2

          • memory/2008-45-0x0000000074E50000-0x00000000753FB000-memory.dmp

            Filesize

            5.7MB

          • memory/2008-47-0x0000000074E50000-0x00000000753FB000-memory.dmp

            Filesize

            5.7MB

          • memory/2008-69-0x0000000074E50000-0x00000000753FB000-memory.dmp

            Filesize

            5.7MB

          • memory/2008-46-0x0000000074E50000-0x00000000753FB000-memory.dmp

            Filesize

            5.7MB

          • memory/2008-41-0x0000000074E50000-0x00000000753FB000-memory.dmp

            Filesize

            5.7MB

          • memory/2008-42-0x0000000074E50000-0x00000000753FB000-memory.dmp

            Filesize

            5.7MB

          • memory/2776-14-0x0000000074E50000-0x00000000753FB000-memory.dmp

            Filesize

            5.7MB

          • memory/2776-2-0x0000000074E50000-0x00000000753FB000-memory.dmp

            Filesize

            5.7MB

          • memory/2776-32-0x0000000074E50000-0x00000000753FB000-memory.dmp

            Filesize

            5.7MB

          • memory/2776-0-0x0000000074E51000-0x0000000074E52000-memory.dmp

            Filesize

            4KB

          • memory/2776-12-0x0000000074E50000-0x00000000753FB000-memory.dmp

            Filesize

            5.7MB

          • memory/2776-13-0x0000000074E50000-0x00000000753FB000-memory.dmp

            Filesize

            5.7MB

          • memory/2776-1-0x0000000074E50000-0x00000000753FB000-memory.dmp

            Filesize

            5.7MB

          • memory/3008-62-0x0000000000400000-0x000000000049A000-memory.dmp

            Filesize

            616KB

          • memory/3008-49-0x0000000000400000-0x000000000049A000-memory.dmp

            Filesize

            616KB

          • memory/3008-66-0x0000000000400000-0x000000000049A000-memory.dmp

            Filesize

            616KB

          • memory/3008-68-0x0000000000400000-0x000000000049A000-memory.dmp

            Filesize

            616KB

          • memory/3008-59-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/3008-56-0x0000000000400000-0x000000000049A000-memory.dmp

            Filesize

            616KB

          • memory/3008-55-0x0000000000400000-0x000000000049A000-memory.dmp

            Filesize

            616KB

          • memory/3008-53-0x0000000000400000-0x000000000049A000-memory.dmp

            Filesize

            616KB