Analysis

  • max time kernel
    120s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/08/2024, 01:55

General

  • Target

    7f5807833be0e855eccdef3320d43440N.exe

  • Size

    191KB

  • MD5

    7f5807833be0e855eccdef3320d43440

  • SHA1

    ebc8320a69f14ed66b0cb5ca1adabd2ce224e65f

  • SHA256

    0fcb21ac21f8d2254ada9cae1e29f6f806c7c24d5febb6510787bb6524a40a03

  • SHA512

    1f7cb58500ff2b9226c411199aeeea03b9d7066b752b70defd57ac7e98accf913f30faea883c4f388878e797463a6c7e579133809f38de9ce25174e548c48feb

  • SSDEEP

    3072:wAKEsYqqjfipJWYpWJZfGXFxUYyaJC6sOMD5Qjj9jRMKSlJ8subptbbG+X:DKE+qjfipJWYpWJZfGXFRJJRsOM9+j5L

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 14 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f5807833be0e855eccdef3320d43440N.exe
    "C:\Users\Admin\AppData\Local\Temp\7f5807833be0e855eccdef3320d43440N.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Maps connected drives based on registry
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\ProgramData\OEMExt\tsasys.exe
      "C:\ProgramData\OEMExt\tsasys.exe" 1
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Maps connected drives based on registry
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Users\Admin\AppData\Roaming\OEMExt\tsasys.exe
        "C:\Users\Admin\AppData\Roaming\OEMExt\tsasys.exe" 1
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Maps connected drives based on registry
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:1852
    • C:\ProgramData\OEMExt\tsasys.exe
      "C:\ProgramData\OEMExt\tsasys.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Maps connected drives based on registry
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2840
      • C:\ProgramData\OEMExt\tsasys.exe
        "C:\ProgramData\OEMExt\tsasys.exe" 1
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Maps connected drives based on registry
        • System Location Discovery: System Language Discovery
        PID:2748
  • C:\ProgramData\OEMExt\tsasys.exe
    C:\ProgramData\OEMExt\tsasys.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Enumerates connected drives
    • Maps connected drives based on registry
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1540
    • C:\ProgramData\OEMExt0\tsasys.exe
      "C:\ProgramData\OEMExt0\tsasys.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Maps connected drives based on registry
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      PID:2444

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\OEMExt0\nak.cat

    Filesize

    9KB

    MD5

    21fad4eabfaaa39470b5d4b7e3e86f37

    SHA1

    d513ad77af23df607f0547db74c39041724e7182

    SHA256

    065401f30ba2849b7f3e224553cebc97411cde40a9e5c924e8b1b75270488898

    SHA512

    dc16f58fe3e5325c247e529e9ebc07589ff97461dc6178195b9595264758078afdccfd5fd2cff1f5b67b90ccca1e7c9f5a69e85ee5225258f285fd78293d8e88

  • C:\ProgramData\OEMExt0\pief.mui

    Filesize

    8KB

    MD5

    af9b0b173be96fd32f8ac63055085340

    SHA1

    b94ebaf3794082515a6e9187259f30da6664a884

    SHA256

    1c3e08d1e549cbf3743a4199345aa5bd1c5bbdb95483e87287f6e390270c48e4

    SHA512

    2e15b5e2b10d12446795d0ef0892d4a89ba4052de49d139fa939c83e07de9c8ccdfc74182003379f2367d237de10f46149168d105b0b99c32b78f211d48156a7

  • C:\ProgramData\OEMExt0\raodobunha\ahowsohau.bin

    Filesize

    4KB

    MD5

    d5cba725db06d1333a2854bc0267baa3

    SHA1

    ad688723a9a5a23a2673a0f38a759ef6b33d444c

    SHA256

    44c8836b9ba1847522a03a06cc6b3d1a75b4c29a9b5a64701d3b0b0cbe30be80

    SHA512

    a201199edeb219f39344f477dad9039737f0e8f79f7d47ce6f630bb627c6c2caecec3f834364eb709696016bbde57fc3f4c9123e7e6aa76d9fa08023d721cc2d

  • C:\ProgramData\OEMExt0\raodobunha\apnubia.cat

    Filesize

    2KB

    MD5

    2726645e1ba2d0f051f7765ec13ab63d

    SHA1

    2e56f43793a0090d7f057111dbc87e020ccea279

    SHA256

    15bdb3aed4cc20b8743f870db7f5948d220826cb888a311fa0503d6feadf12f4

    SHA512

    a1e837804d3f9fa918dcd6840b79b703a5bebf4faf7f886161a6d5c2b981afe9b27e9ac304dac195def34f4d3ec74930b04c4f70f517a69c4b93b2d0fe87b4f5

  • C:\ProgramData\OEMExt0\raodobunha\enni.dat

    Filesize

    9KB

    MD5

    365c5d73257fb61e09a9f0807fc08f9c

    SHA1

    aaf0cfc052d9bb33e20866d00fc58146a7e5f196

    SHA256

    976bfd0e0f0b3c494f795201ced91fd0be0d22fe4e957ee1824e638b044ce041

    SHA512

    097a9c7f35b6cd18bf0d49139d82a57da847e6952ba48d4035e97a83ae943f02611bc4bcef7aec0f1c019c03323f92bf2bd955d11cd924ed1bbe0ed864a888b1

  • C:\ProgramData\OEMExt0\raodobunha\etet.drv

    Filesize

    4KB

    MD5

    87c7661506a794a48cc40a9d2b245285

    SHA1

    bb858482ca69576c6ceaa3cea51f01c5a5a89246

    SHA256

    c414de31b8067c7b2c3ae53dea6e979cbdbfa1b6017e43ee0e1154b9c8cb4c52

    SHA512

    b67180cb3b67ad1f18b643da2b321c69e9228049e757c4f8ca142f39935bd84a8e1199c7fc3ebbd1d1c119d671d5930a99a7661e9e82a74f0aee9f5114c612c1

  • C:\ProgramData\OEMExt0\raodobunha\olitxu.sys

    Filesize

    1KB

    MD5

    5905b5c0c8d1c9409db7f8c043a2f71c

    SHA1

    72197b5cd25ec7bfdbf314fdd546b4388c462d07

    SHA256

    cb3fafeee5f28b8996961f79112b13bb5114b121e8bb390834cba26e9fd21897

    SHA512

    6630b2af91de144bd40e3f3ea1893505512cb9ecae73cef4fe0da5e34a273eb6f7fa7cbfdddb5e386ec94a1c80a6ecc6251eb9dfa301743e18dd4c3ca0da83fd

  • C:\ProgramData\OEMExt0\raodobunha\qoalorhuxu.bin

    Filesize

    3KB

    MD5

    b84f5c49477cb517c9f06aa4b5d7f328

    SHA1

    dbb21430014709fd6d1f69681008a578efcc1975

    SHA256

    6deb4cb05697a08b9173c32699b6cc49e922ab7f9c79074b357539dc27d127f9

    SHA512

    324fa4fb0575f793816e088493a8d769d070c4dcb3af5516cba58cd41adf013390e18fc71aea17f1f4e90e108b5d8c390ceab0b8bfb691566c624039d560d67d

  • C:\ProgramData\OEMExt0\raodobunha\quumavaci.dat

    Filesize

    6KB

    MD5

    c2675d67b6f9b53e11371dca5c741b85

    SHA1

    ae0e107d053846dd444e1b60847c188f6c4b2c3c

    SHA256

    7fea1c1978e4e5030e51aa6fdbd36571ce2ae0a50febf158549c331ace843670

    SHA512

    ef8a89c02387a0d62baae89bc060c57f3ed578f6424bddc228abae8141bceb381ee92c83ee66de8c7123f94ea50cde5a9ba61252ea4e691b6b74698ca3301b9f

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\3ZOOFTZF.txt

    Filesize

    219B

    MD5

    2b7b0c68954a51abf154677431612646

    SHA1

    f65113551e56a6812116de6ed4f57d82924ac014

    SHA256

    4a61a23832c4e9b7e6548e808586c489ea74637b82ca3f75a0c0bd5628571503

    SHA512

    50210e7b771374840cb370f8d5507b4c7fbf780214d9bb0f20ded3c508420280b5048503a0b33f2680f930dcb42cffa6b6b812aab3b2c9242d9e2329d817908b

  • C:\Users\Admin\AppData\Roaming\OEMExt\wsxs\diedinpaac.dmp

    Filesize

    1KB

    MD5

    05123e89151df03c6e9a6768fb3e9317

    SHA1

    1d7f17e2cc10569ad74744ea95a0c6f3f6a4f49a

    SHA256

    3e6deec1efac2d5889d1ece3c50fa6a2ddaa9570302e8906be554553c3578650

    SHA512

    628372e459215e0a31f83706f4a88b8dd7f0b4d16f52c6a3a506c514a251021f0d5e4e4b723a0713952add6ec83c857ad96521ddffcd2fc2f9a821b91c03a5f5

  • C:\Users\Admin\AppData\Roaming\OEMExt\wsxs\nutaewuv.dat

    Filesize

    4KB

    MD5

    fbc1eb7aeb7c24a6b5bb7b1ce374ca21

    SHA1

    8c7644e71cc8f0da4834c476574290218b009388

    SHA256

    df81998f771eb486a1cc556afbd7a949403532bb22ed071ec07dea9b12fd10ec

    SHA512

    3c599902cfc4be5e90bb5aa77f0c8983d453a94d5b1b0a0ce81d6b4f8db33905d03e451264de240aeca6f9f5f096987b6f6e9af180ebb4d3c82de1bfea3e54fb

  • \ProgramData\OEMExt\tsasys.exe

    Filesize

    191KB

    MD5

    24e53baea119972bc1c1d9405d506f1f

    SHA1

    65f264c222728cbc12ab0df29bef8753026f8432

    SHA256

    7f8bc51cc548c6f448a9451c873e687512f1a249ae92a92078adac8350c1be60

    SHA512

    3f1543f6c1e031bffee32138de352df274a2c9758a4cbcfcea9b16bc8c7c445445496c76185662d32c80052571499aded25be051473f5e2103d264eb657ff79e

  • \Users\Admin\AppData\Roaming\OEMExt\tsasys.exe

    Filesize

    191KB

    MD5

    f4af665de024bd4b8aa517fbb5b89b23

    SHA1

    62988ec7a726cc2bd5491a15b3e18d5fcc2d353f

    SHA256

    85f8ce38587513a9eb251da97df09ebe4258829214678bf365b77dd5ae0c1a29

    SHA512

    663b2c5f6025443539497e969999a14019c9491e80a16f62b709ab43f178af5b47bdb33411375e017da3ab6fd8d56adce161e3854f16b24c6dbc3ae93a2f16d2