Analysis

  • max time kernel
    130s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    31/08/2024, 05:48

General

  • Target

    Thermo Fisher RFQ_TFS-1207.exe

  • Size

    590KB

  • MD5

    9768c048c979aeeeeb051574d452b626

  • SHA1

    414d48d77fc71d29e58a92d02fa2d770fb854339

  • SHA256

    19b8eabc143b4307a4496fec6012965f918e18d0e33a989292568f37a4c5f1ba

  • SHA512

    9153c973c3ed1f5f1964671e084b1bd764d9850fd87feab3a78acf417178d8f32ee6c16c044020979066bf4b2ad7e2e1e3449a7df3954f78ab9ce9ea649c9bce

  • SSDEEP

    12288:QG05Z3OJwnoJIn8f/FAOeanklK9N8QGMi7B1mSwIhCjVnj:QGz4om8ftAOLKwuQWB1mSlCjVj

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 10 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Thermo Fisher RFQ_TFS-1207.exe
    "C:\Users\Admin\AppData\Local\Temp\Thermo Fisher RFQ_TFS-1207.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2284
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 396
      2⤵
      • Program crash
      PID:1684

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nseFE0F.tmp\LangDLL.dll

    Filesize

    5KB

    MD5

    549ee11198143574f4d9953198a09fe8

    SHA1

    2e89ba5f30e1c1c4ce517f28ec1505294bb6c4c1

    SHA256

    131aa0df90c08dce2eecee46cce8759e9afff04bf15b7b0002c2a53ae5e92c36

    SHA512

    0fb4cea4fd320381fe50c52d1c198261f0347d6dcee857917169fcc3e2083ed4933beff708e81d816787195cca050f3f5f9c5ac9cc7f781831b028ef5714bec8

  • \Users\Admin\AppData\Local\Temp\nseFE0F.tmp\System.dll

    Filesize

    12KB

    MD5

    192639861e3dc2dc5c08bb8f8c7260d5

    SHA1

    58d30e460609e22fa0098bc27d928b689ef9af78

    SHA256

    23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6

    SHA512

    6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc

  • \Users\Admin\AppData\Local\Temp\nseFE0F.tmp\UserInfo.dll

    Filesize

    4KB

    MD5

    f8b6dd1f9620be4ef2ad1e81fb6b79fa

    SHA1

    f06c8c8650335bace41c8dbe73307cbe4e61b3b1

    SHA256

    a921cc9cc4af332be96186d60d2539cb413dfa44cfd73e85687f9338505ff85e

    SHA512

    f15811088ecde4cd0c038db2c278b7214e41728e382b25c65c2eb491bc0379c075841398e8c99e8cceba8be7e8342bc69d35836ebe9b12ebebff48d01d5fa61a

  • \Users\Admin\AppData\Local\Temp\nseFE0F.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    b7d61f3f56abf7b7ff0d4e7da3ad783d

    SHA1

    15ab5219c0e77fd9652bc62ff390b8e6846c8e3e

    SHA256

    89a82c4849c21dfe765052681e1fad02d2d7b13c8b5075880c52423dca72a912

    SHA512

    6467c0de680fadb8078bdaa0d560d2b228f5a22d4d8358a1c7d564c6ebceface5d377b870eaf8985fbee727001da569867554154d568e3b37f674096bbafafb8

  • \Users\Admin\AppData\Local\Temp\nseFE0F.tmp\nsExec.dll

    Filesize

    7KB

    MD5

    11092c1d3fbb449a60695c44f9f3d183

    SHA1

    b89d614755f2e943df4d510d87a7fc1a3bcf5a33

    SHA256

    2cd3a2d4053954db1196e2526545c36dfc138c6de9b81f6264632f3132843c77

    SHA512

    c182e0a1f0044b67b4b9fb66cef9c4955629f6811d98bbffa99225b03c43c33b1e85cacabb39f2c45ead81cd85e98b201d5f9da4ee0038423b1ad947270c134a