Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 00:51

General

  • Target

    dbca7b0f1114eb90427e1550b5da2420N.exe

  • Size

    3.2MB

  • MD5

    dbca7b0f1114eb90427e1550b5da2420

  • SHA1

    be05fd9f4f7ec4658e079964425a0acf256e2914

  • SHA256

    7a1d6772dc20ab324045af50888733957627763f641b13b2a2a1f0379a35d332

  • SHA512

    7eb4205686c9eb0f30147fb196df15d511f6286f2c40a940450ef10079ca871d75763405f4a812511e56d6043614f387dd1891f65c877c829e998271c534c3ce

  • SSDEEP

    98304:PXbAlRS/NcakcxQZMEVgcakcZUgWLZvAxZacakcxQZMEVgcakcO:PreRidlxQaEedlZjVadlxQaEedlO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dbca7b0f1114eb90427e1550b5da2420N.exe
    "C:\Users\Admin\AppData\Local\Temp\dbca7b0f1114eb90427e1550b5da2420N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\dbca7b0f1114eb90427e1550b5da2420N.exe
      C:\Users\Admin\AppData\Local\Temp\dbca7b0f1114eb90427e1550b5da2420N.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:1820
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks.exe /CREATE /RL HIGHEST /SC ONLOGON /TR "C:\Users\Admin\AppData\Local\Temp\dbca7b0f1114eb90427e1550b5da2420N.exe" /TN bhajjKTJe128 /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:1260
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c schtasks.exe /Query /XML /TN bhajjKTJe128 > C:\Users\Admin\AppData\Local\Temp\w5rw01.xml
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Windows\SysWOW64\schtasks.exe
          schtasks.exe /Query /XML /TN bhajjKTJe128
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2800

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

          Filesize

          342B

          MD5

          689e13d7b1fff900c9371d3901167123

          SHA1

          0b7e0f79a9303b4203e45f950097dad129b2b995

          SHA256

          6f3f733dc13a7bca9b9e0ebd2ea07fc3a67fd1468ca7c9867f7ef5fe7326e59c

          SHA512

          669f092adc98440c0514c9de638b5311470adc7fcb81855bbc52f9cdf868f9e6d11dee22cb7979043e51f866feb3b4219a6c89e278f8b03c7b5e5a454303c78a

        • C:\Users\Admin\AppData\Local\Temp\Cab9AEA.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar9AFD.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\dbca7b0f1114eb90427e1550b5da2420N.exe

          Filesize

          3.2MB

          MD5

          84080aa5906fd4223d4467dc0f0fbbbd

          SHA1

          44e9576a0a53904f549c4b070107cc57e46ed099

          SHA256

          5d075e46582b8c06e37d3f22d321f37b8c77dc070dc72807d45e28403b8e4d36

          SHA512

          cf74ff605ed9a6e2bb25a7f8e9686dc365a205fcd86a9859be5f11d975c2bd408831bb455fc616a7b4b1dd29cf3671da94b93b0c286d2ac9bfc75832791d9f92

        • C:\Users\Admin\AppData\Local\Temp\w5rw01.xml

          Filesize

          1KB

          MD5

          2c4e2f09b1cb32bef7fb0cf5ce8f095d

          SHA1

          f0bb2c7382ecb44e83dd1984fd73f860a148963e

          SHA256

          8c4f3f7334b9c34460a05d1288764d0011c4d78c90e426e24de57163cbe070cb

          SHA512

          8166b1f82f5c17f1a9dbfb20bd5f62a1c52a57be9e0e7ae60d42c278c3c5b7939705e51bb9a4e91fce3db2b09fd31d3528e1d72759e9ecf70e34fd42b3f89653

        • memory/1820-25-0x0000000001660000-0x00000000016DE000-memory.dmp

          Filesize

          504KB

        • memory/1820-18-0x0000000000400000-0x000000000065C000-memory.dmp

          Filesize

          2.4MB

        • memory/1820-26-0x0000000000470000-0x00000000004DB000-memory.dmp

          Filesize

          428KB

        • memory/1820-27-0x0000000000400000-0x000000000045B000-memory.dmp

          Filesize

          364KB

        • memory/1820-116-0x0000000000400000-0x000000000065C000-memory.dmp

          Filesize

          2.4MB

        • memory/2100-17-0x00000000234E0000-0x000000002373C000-memory.dmp

          Filesize

          2.4MB

        • memory/2100-15-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2100-1-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/2100-5-0x0000000022DC0000-0x0000000022E3E000-memory.dmp

          Filesize

          504KB

        • memory/2100-0-0x0000000000400000-0x000000000065C000-memory.dmp

          Filesize

          2.4MB