Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    31-08-2024 17:30

General

  • Target

    00cef7f4d996791b82a9d1885afebd185e92174ab115a292167c6d55fd80e19b.exe

  • Size

    224KB

  • MD5

    b49e5cee6853409f78202e39674b5b2b

  • SHA1

    46a5d8212427fca9cfad1dd00cd38a44fe1e30f9

  • SHA256

    00cef7f4d996791b82a9d1885afebd185e92174ab115a292167c6d55fd80e19b

  • SHA512

    5db759ec344a2568b0a7fa4bfcb5b758f8da1a73027fe28510a3c85facdff7c3975e4e44ffe948cdd3df72021f160842f347c3aeb93240d5c54faa7778136fcd

  • SSDEEP

    3072:vHjk+0oLnWFnzBHv/xWFsg8WatFBGFVWPE5ac0pG/1z+QVMbg1jm0+J:Po/BHng5HaVG4G/1z+QVMbg1jv+

Malware Config

Signatures

  • Vobfus

    A widespread worm which spreads via network drives and removable media.

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Script User-Agent 2 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\00cef7f4d996791b82a9d1885afebd185e92174ab115a292167c6d55fd80e19b.exe
    "C:\Users\Admin\AppData\Local\Temp\00cef7f4d996791b82a9d1885afebd185e92174ab115a292167c6d55fd80e19b.exe"
    1⤵
    • Adds policy Run key to start application
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious behavior: RenamesItself
    • Suspicious use of SetWindowsHookEx
    PID:2416

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\AG58FPQON.exe

    Filesize

    224KB

    MD5

    efe8570955187751875d7d1604d40622

    SHA1

    85e98c96d050a3791adba6215ce99935d91541ea

    SHA256

    cf3f5cced524f37fd341c55cf360d0fee1e0679dc8fe8d2dd9739c9fd3b071f4

    SHA512

    2bd6bac13cb3b2bc32bc129015e2cdc2c9f3ed60f978b0a59c74bb01de863179ce8b6a085c9684815b7cc661d29f6cc011be13bf45f4cae7ca2750c21a8166d4

  • memory/2416-0-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2416-11-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2416-68-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB

  • memory/2416-282-0x0000000000400000-0x0000000000437000-memory.dmp

    Filesize

    220KB