Analysis

  • max time kernel
    15s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    31/08/2024, 23:48

General

  • Target

    22ccce62af23834844739a655d626ab0N.exe

  • Size

    895KB

  • MD5

    22ccce62af23834844739a655d626ab0

  • SHA1

    0378126d47b501ff0e831eb556e9fd52d68fb96f

  • SHA256

    c750dc34afcb0465976217f9257a3141981bf58750fb2052238ba60efda8041e

  • SHA512

    bb321accfbaf7ea12c56dfd0e73af1e747f61b58c854d11468b20b181961c2c28dccfacfed87eb28cba625cfd850e5632b2849125889cc7a38d0eac7f1688479

  • SSDEEP

    24576:WbX+3Ze0p4Ek4niOkl/A04szE87JKTvmN:WbX+JeW4SkZP4sz9Mbm

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\22ccce62af23834844739a655d626ab0N.exe
    "C:\Users\Admin\AppData\Local\Temp\22ccce62af23834844739a655d626ab0N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2144
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\dev9CCC.tmp!C:\Users\Admin\AppData\Local\Temp\22ccce62af23834844739a655d626ab0N.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Users\Admin\AppData\Local\Temp\22CCCE62AF23834844739A655D626AB0N.EXE
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:2404

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\MSWDM.EXE

    Filesize

    47KB

    MD5

    336ffd74e5eb29bc13e4e0f5de0cb57a

    SHA1

    fb3bab77482267f8880cd329d926a41d397d072d

    SHA256

    688c0c407e9651d4fb63017475f3ca304c7ff8c0185592c3a1d7d3b660098c79

    SHA512

    e8e70882eebbb5a602ac68a4a51a15c7d32d083b5c5717981a9b33d358e17411a0fee1294b631f29f0f5cf06e0ad86109198de6114ba364fdaac1e866a049d76

  • C:\Windows\dev9CCC.tmp

    Filesize

    847KB

    MD5

    c8f40f25f783a52262bdaedeb5555427

    SHA1

    e45e198607c8d7398745baa71780e3e7a2f6deca

    SHA256

    e81b44ee7381ae3b630488b6fb7e3d9ffbdd9ac3032181d4ccaaff3409b57316

    SHA512

    f5944743f54028eb1dd0f2d68468726b177d33185324da0da96cdd20768bab4ca2e507ae9157b2733fd6240c920b7e15a5f5b9f284ee09d0fd385fc895b97191

  • memory/2068-23-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2144-24-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2144-26-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2572-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2572-12-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB