Analysis

  • max time kernel
    112s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    04-09-2024 13:40

General

  • Target

    50a07b7dc7fce2caf921093b5017e6b0N.exe

  • Size

    170KB

  • MD5

    50a07b7dc7fce2caf921093b5017e6b0

  • SHA1

    3a8fa404134394ce3a17e1ed41d3fafe243462da

  • SHA256

    ec6aebaf897b7513438d0a9e948faa76074e04a0c4cf9921c8c7ae6c1895d13e

  • SHA512

    4176776c68fcf05112eccb45f19ecc330dd91e8ea2113846d3a12c00ef1e5a7dcd3f9e32bc4be2a2b83cd3278c6bb5c762d405573a418073151c780a7dade306

  • SSDEEP

    3072:KJpOm5axh63laEo+pXX1pQD2UCohD8mxLCj+5cmeDye42L712xrpdJ8xLeb7Ux:MAm5oh63laEo+pXX1pkF8mxeq5+4m71t

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Maps connected drives based on registry 3 TTPs 14 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Modifies registry class 62 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\50a07b7dc7fce2caf921093b5017e6b0N.exe
    "C:\Users\Admin\AppData\Local\Temp\50a07b7dc7fce2caf921093b5017e6b0N.exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Maps connected drives based on registry
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\ProgramData\CDRM\nlcmt.exe
      "C:\ProgramData\CDRM\nlcmt.exe" 1
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Maps connected drives based on registry
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2948
      • C:\Users\Admin\AppData\Roaming\CDRM\nlcmt.exe
        "C:\Users\Admin\AppData\Roaming\CDRM\nlcmt.exe" 1
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Maps connected drives based on registry
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:2344
    • C:\ProgramData\CDRM\nlcmt.exe
      "C:\ProgramData\CDRM\nlcmt.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Enumerates connected drives
      • Maps connected drives based on registry
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\ProgramData\CDRM\nlcmt.exe
        "C:\ProgramData\CDRM\nlcmt.exe" 1
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Maps connected drives based on registry
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        PID:1732
  • C:\ProgramData\CDRM\nlcmt.exe
    C:\ProgramData\CDRM\nlcmt.exe
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • Enumerates connected drives
    • Maps connected drives based on registry
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:284
    • C:\ProgramData\NTService0\cwrss.exe
      "C:\ProgramData\NTService0\cwrss.exe"
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Maps connected drives based on registry
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      PID:2448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\56KJ964X\Q905NGKQ.txt

    Filesize

    14B

    MD5

    feed726ebc1f03353dbb7c216a8c3d65

    SHA1

    e13b2684fea4068faef8cd1881c2e9f3a1c0b694

    SHA256

    299f6464589de6ee619d792fd3714935256a545530fd0a4f8422982b0b24b259

    SHA512

    7d3f57ff83cbbe4bb57a06399749798a58a15edb29b49ff343825496a1a34a898fadebf866983be287bea2be0f604d0ba7b32847b1d0e0839078c0f36ecf0c0b

  • \ProgramData\CDRM\nlcmt.exe

    Filesize

    170KB

    MD5

    a9a19335d08a0c83a8a82e2a11e0e192

    SHA1

    b3f68055d337a3d39d47937d299b42b3a3a6d334

    SHA256

    3439bf5ccea140a11f2f5917a538b73b9ef826a9edfd84e9b2a9614c546ca4b6

    SHA512

    ecb2715579fcea1042fc2fe1b8b76373589b9404a4745b295906aad9f6172d19ec3bb326a050d16bd50016b598f337feb422f13202aa2694ec8eff5fbeb9690d

  • \ProgramData\NTService0\cwrss.exe

    Filesize

    170KB

    MD5

    ecbab69fb54e03c952d997dc86fc639c

    SHA1

    bdc5e4c4e306d7e6b33bddc55125a43b38514389

    SHA256

    eebdfc976f82ee3d226dd02fdb647cfd1d157b01a73afce5584cc37a2f6a9514

    SHA512

    196c2d52cac4f12d6025c8407dc12b4b8022cb819c4502146d3db9932a230a800a8a8ecf05d9bf65db80696b8f66d00459e6f9b06b570cbc843b3b60ac2372bd

  • \Users\Admin\AppData\Roaming\CDRM\nlcmt.exe

    Filesize

    170KB

    MD5

    15e2750e3fccb49d185fbe320d75bc8e

    SHA1

    c7e8b83200f906e0223fbcecb51200ba298ef286

    SHA256

    b9c6385aee843c187939c614892122ff5886b77d67564a108a69f3d8eab7103c

    SHA512

    16776aa17289f73697486a0829ed526387361707bf866b5b22c043a6d79f749d144a230c1851f982691f0948188c1267252dc62136d7b6aa2b1c62bd6d948adf