Analysis

  • max time kernel
    30s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    25-08-2024 13:12

General

  • Target

    8397c3d2363d9a31483e8113a0e8a7b0N.exe

  • Size

    96KB

  • MD5

    8397c3d2363d9a31483e8113a0e8a7b0

  • SHA1

    deb6ea523ee2d12e0c38dcc103ba4fce4558b355

  • SHA256

    1605bb64e40e88c32c72575dc5d0a1c8b20aee94ddb7c5dd21a0d8eeb6ce6f9f

  • SHA512

    92c0a3d001aba5decc5ee28ea807312b980bd59b848d0cc5835e66ad8cc3baf99830295da6d399469412ff7fd5d08e81e435390926eec0b58705926d1b223b7a

  • SSDEEP

    1536:J+jorYjLZoTIsFzfuifMfP0hWagAziqWyUry5ZMHeoRQ+xR5R45WtqV9R2R462iW:JzkXZoFju9vkzifOvoe+xHrtG9MW3+3W

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8397c3d2363d9a31483e8113a0e8a7b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\8397c3d2363d9a31483e8113a0e8a7b0N.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Windows\SysWOW64\Cacacg32.exe
      C:\Windows\system32\Cacacg32.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2712
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 140
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:3016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\Cacacg32.exe

    Filesize

    96KB

    MD5

    0be425321d169acdbb09c4da1e0b1ee2

    SHA1

    aa19c5d3c78573401c59539993d40e16081f39ca

    SHA256

    fd0fe6b9b013dbea93418fdd82150accd76adcf027e0d39fbc680932fb7049ef

    SHA512

    b914df58690933dc0287595f99a0557e7f2d2c84132565303b3689c39ebe911d7f15ae67881a5f591b6ec0d75c98f99bf8fc6aa105af4aad3ef47987abb6bf7f

  • memory/2712-13-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2880-0-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/2880-12-0x0000000000250000-0x0000000000291000-memory.dmp

    Filesize

    260KB

  • memory/2880-18-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB