Analysis

  • max time kernel
    15s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    25/08/2024, 20:40

General

  • Target

    fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe

  • Size

    448KB

  • MD5

    fb8f8634e228a5cdb7ec40b88b0b0dc0

  • SHA1

    aaf306db05fdfd9837af045dfb10b2eec85e2118

  • SHA256

    1e07df0f9b61bc8af51271540177e85b7f0e784e3becd8c5948c2a0b923ff2c2

  • SHA512

    aa614d15f0d3d24f62b587fc053052f12e30a5cc0aab229c5ceb03c3e2c3e7230ef0d890e111ba2bbceb89b972a68bb5d253618e171d7f485f5eb2a564888998

  • SSDEEP

    6144:j79jE+Fs0tU7ljAtFtqnjkEjWbjcSbcY+CaQdaFOY4iGFYtR:NEYXzRqnjkFbz+xt4vF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe
    "C:\Users\Admin\AppData\Local\Temp\fb8f8634e228a5cdb7ec40b88b0b0dc0N.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1440
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\windows\YVCNZ.exe.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\windows\YVCNZ.exe
        C:\windows\YVCNZ.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2472

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\YVCNZ.exe

          Filesize

          448KB

          MD5

          6af1e813d7c4edde23f245e40e6a693d

          SHA1

          c248b32502beabe8ad6bc3fe07e44db2b8e93e61

          SHA256

          ee44a8b00d68c7a747b4bdce6e5755b99f3226ec4c9dd68f8e75824930b7b9df

          SHA512

          e3921e61a67c6a90b5983b5fbec7c063f847249c9d68504220df2d040ac3b8db3662173cba407ca0f56a48fe045e5e63d0f0036b783b18906ce4133f5b82a291

        • C:\Windows\YVCNZ.exe.bat

          Filesize

          56B

          MD5

          d017671bf93fd881a7c8d09c5a265009

          SHA1

          f06af49582516592db00e854061c6bb27d928a41

          SHA256

          5bc7c909df395fd7017acc1d6219b9e32b1110ae56bf4870a89a44241e9b0742

          SHA512

          8e4b91499503e03009bdbb592dd7bd9f0a188172bd5402c34f7c75ce54c7b3a983ee4a172d033b8ff51178da0ad7c664f228e576ec0f8794a4da2bb55c5b3a1e

        • memory/1440-0-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/1440-12-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/2472-16-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB

        • memory/2472-17-0x0000000000400000-0x0000000000438000-memory.dmp

          Filesize

          224KB