Analysis

  • max time kernel
    121s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 20:23

General

  • Target

    $PLUGINSDIR/shareddlls_install.exe

  • Size

    2.8MB

  • MD5

    4fe8ff7f02020ea655944db5541722f3

  • SHA1

    b5ff619c215529a4531337eef36167051cded658

  • SHA256

    599c63aa0d0496363c7c99217e6c3d941125907cc4ea4c7d5d73c9b54e3deaee

  • SHA512

    f4802d00d46c59882a1e1d3b8c0a43fd2ba4b22819d5417ad81cf4522e796176a920f81a6753e8297d49b3b0e60f3e1c27e4fbff2a6cc100d01cd0a39a75b4e3

  • SSDEEP

    49152:lNXkhjpZr+L6hsoD/cSjvJafJc3eXIeGixJbsf4GQHwFjPfLtv+W3oZYKwL:lZ2XCGyk/cSrJafogfGiK6QFjXLfuYK6

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\shareddlls_install.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\shareddlls_install.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: GetForegroundWindowSpam
    PID:2512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsjCE0B.tmp\ioSpecial.ini

    Filesize

    696B

    MD5

    40f5b3bb30d40f68a4ecce7c6dbf00b8

    SHA1

    58cda46985ec31b5ca541890df40f608ed1db919

    SHA256

    65a8b2c266c3a60514583cca87fbaf9c7a13926916565b16ad8f43b72a30959f

    SHA512

    1d044d37421152de1dbebedf5db71346f6569601c3ca3f8942a7fa8fb41fae45189f0f04d259de3cc2295b6e51961ade787399d3449aec5d6a0fe6a9df518363

  • \Users\Admin\AppData\Local\Temp\nsjCE0B.tmp\InstallOptions.dll

    Filesize

    14KB

    MD5

    325b008aec81e5aaa57096f05d4212b5

    SHA1

    27a2d89747a20305b6518438eff5b9f57f7df5c3

    SHA256

    c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b

    SHA512

    18362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf