Analysis

  • max time kernel
    118s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-09-2024 18:36

General

  • Target

    797173f063f60c8edbbdf7dddb4fa439f03c044bc0125aebc5d3870f78b980df.exe

  • Size

    326KB

  • MD5

    a839c4a9950c700d74006cc4634405ce

  • SHA1

    182eff469e58140ebbdc0206eeb34c728e3f550a

  • SHA256

    797173f063f60c8edbbdf7dddb4fa439f03c044bc0125aebc5d3870f78b980df

  • SHA512

    ca19fee3e0793753a7053a4422a438cbeaab959da8095407790e366aa975de79a1ff5cc92e0520fa2d9e203cd6499e9f7e527013e7ab2591cc54634bf5994851

  • SSDEEP

    6144:l8JsLcpjzTDDmHayakLkrb4NSarQWexpXs83p2+QzUDX:izxzTDWikLSb4NS7DxpXs83kpzUb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\797173f063f60c8edbbdf7dddb4fa439f03c044bc0125aebc5d3870f78b980df.exe
    "C:\Users\Admin\AppData\Local\Temp\797173f063f60c8edbbdf7dddb4fa439f03c044bc0125aebc5d3870f78b980df.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Exploit.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Exploit.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 1552
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2800

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Exploit.exe

    Filesize

    63KB

    MD5

    225a4eabcc2def3934cd55d63c99a98a

    SHA1

    07f07a4504e1a05e76320206c73284250ee68cb0

    SHA256

    b98a5f1094e4e8c3461d0627f9f3d023ac2ec908a7f6b31b0a6b78b8acfc523b

    SHA512

    27b4316f1e34d07d749eb2b1fcd058ce12938e3b4bd16e55ca73ddeb2631143e3d3a30801d5266fab508a9818e611ade7d8f1053487e9fca5a2283b4f0b28487

  • memory/2088-16-0x00000000744BE000-0x00000000744BF000-memory.dmp

    Filesize

    4KB

  • memory/2088-17-0x0000000000F10000-0x0000000000F26000-memory.dmp

    Filesize

    88KB

  • memory/2088-18-0x00000000744B0000-0x0000000074B9E000-memory.dmp

    Filesize

    6.9MB

  • memory/2088-24-0x00000000744BE000-0x00000000744BF000-memory.dmp

    Filesize

    4KB

  • memory/2088-25-0x00000000744B0000-0x0000000074B9E000-memory.dmp

    Filesize

    6.9MB