Analysis

  • max time kernel
    111s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03/09/2024, 09:46

General

  • Target

    ef0e411457af2287f0376372fb5ea2d0N.exe

  • Size

    6.7MB

  • MD5

    ef0e411457af2287f0376372fb5ea2d0

  • SHA1

    c68815eb21262a135dd82169498c87f4a44119df

  • SHA256

    c9be0e41a686fc3836c1d117c8b58d763532839ec84cd9024a0185e2c1165f01

  • SHA512

    124ed67ec951a6f97df9d2b60ecfc2d7ec8c10121cf93367eafc5fef6b79f6cc890d18593e498aa2ae94a4ee0d1deb67a22491a5b562e16f64e9aab3ff679c43

  • SSDEEP

    98304:NuX4jhmCbtfUdmhNRcLo2xroQt3UMxvNGQFBDq1O5mhLb5zpAZxBWw2BqsB6nnrY:ZkefxNRcUexQQXKimt5zpAZqlBqsCspN

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 6 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef0e411457af2287f0376372fb5ea2d0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ef0e411457af2287f0376372fb5ea2d0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3008
    • C:\Users\Admin\AppData\Local\Temp\is-R4FHK.tmp\ef0e411457af2287f0376372fb5ea2d0N.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-R4FHK.tmp\ef0e411457af2287f0376372fb5ea2d0N.tmp" /SL5="$4010A,6560080,223744,C:\Users\Admin\AppData\Local\Temp\ef0e411457af2287f0376372fb5ea2d0N.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2440
      • C:\Windows\SysWOW64\Taskkill.exe
        "Taskkill.exe" /IM BetterHash.exe /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:1176
      • C:\Windows\SysWOW64\Taskkill.exe
        "Taskkill.exe" /IM UnRAR.exe /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2452
      • C:\Windows\SysWOW64\Taskkill.exe
        "Taskkill.exe" /IM BetterHash-main.exe /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2884
      • C:\Windows\SysWOW64\Taskkill.exe
        "Taskkill.exe" /IM BetterHash-main-g.exe /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:584
      • C:\Windows\SysWOW64\Taskkill.exe
        "Taskkill.exe" /IM pcupd.exe /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2972
      • C:\Windows\SysWOW64\Taskkill.exe
        "Taskkill.exe" /IM OhGodAnETHlargementPill-r2.exe /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-R4FHK.tmp\ef0e411457af2287f0376372fb5ea2d0N.tmp

    Filesize

    855KB

    MD5

    63df8e2e28158591b7d9722f63a92934

    SHA1

    a133381ad36a2b54dab0d9e64e4a895bbc04e770

    SHA256

    868e5f4c2dfe86ea63ecc55872f6db4bbd1be2fe355fb75e2bf2578fe7845e27

    SHA512

    a866d0c69f6f143fbdfb89a2597243697520343152cef9ee938002d6022f4ec3ebfa270fa9f49eb55fc60a991d7971ec46a80623022a35e90c0afcc496be9ed3

  • \Users\Admin\AppData\Local\Temp\is-U2HQD.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • \Users\Admin\AppData\Local\Temp\is-U2HQD.tmp\analytics_v2.dll

    Filesize

    4.5MB

    MD5

    14fbcbb87fe9518680903eb1683dc1be

    SHA1

    10358e2ba329aef7f6b5e861e818b1b6ef777ce6

    SHA256

    9485fc765bb9b8bb46dca8fede4c0ddd315febf7b0ac75e56240d6f4ac85883a

    SHA512

    657e10f44f76c926c191800ad40ed47d678a5463bcca61d4ff4a0c35738dd0257cea4a32031fb9819fc88676915e26ea25920df8f6287812339702fcf15f2f0a

  • memory/2440-8-0x0000000000400000-0x00000000004E6000-memory.dmp

    Filesize

    920KB

  • memory/2440-21-0x0000000000400000-0x00000000004E6000-memory.dmp

    Filesize

    920KB

  • memory/2440-22-0x0000000074ED0000-0x000000007537B000-memory.dmp

    Filesize

    4.7MB

  • memory/2440-49-0x0000000074ED0000-0x000000007537B000-memory.dmp

    Filesize

    4.7MB

  • memory/3008-2-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB

  • memory/3008-0-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB

  • memory/3008-20-0x0000000000400000-0x000000000043D000-memory.dmp

    Filesize

    244KB