Analysis

  • max time kernel
    119s
  • max time network
    30s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/09/2024, 06:34

General

  • Target

    b9c80a9605c34bb3472ffc193cd3e940N.exe

  • Size

    163KB

  • MD5

    b9c80a9605c34bb3472ffc193cd3e940

  • SHA1

    84282604a6add4af76d2fb1470dac3d704f74a8a

  • SHA256

    a546c9b5d673c8cff8faa27b716b45d6d18675ccd81d19e6ab1c8c3d7a009b8a

  • SHA512

    d7ac3562372262a7c16915af742c0a407f5b66646f75dbe0777e0f77e1ce4f25e51b75d8484d3761fb715933336a34c8f0b39d86737765ed999fce4df4ce6479

  • SSDEEP

    3072:Fm8QyMWSVCqwT1h+popOOfaPOx5P+m/pNdhZ1QYUdq:HqwJh+6pAkGm/pH1gdq

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • UPX packed file 17 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 41 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9c80a9605c34bb3472ffc193cd3e940N.exe
    "C:\Users\Admin\AppData\Local\Temp\b9c80a9605c34bb3472ffc193cd3e940N.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Users\Admin\AppData\Local\Temp\b9c80a9605c34bb3472ffc193cd3e940N.exe
      "C:\Users\Admin\AppData\Local\Temp\b9c80a9605c34bb3472ffc193cd3e940N.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2956
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\DOQLJ.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:644
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "sidebar" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:1584
      • C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe
        "C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:696
        • C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe
          "C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:1952
        • C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe
          "C:\Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe"
          4⤵
          • Executes dropped EXE
          PID:2904

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\DOQLJ.bat

    Filesize

    157B

    MD5

    f6a90c20834f271a907a4e2bc28184c2

    SHA1

    36c9d1602b74f622346fbb22693597d7889df48d

    SHA256

    73f29cd953eee40cea4de67842556ffd96efe8094a6a9b70f33a35df2582febd

    SHA512

    39cabae19fe1faa37455e4bd242c868be60d6252b07f01224b3f7501c3cf734e503300b840d83381a452707cab6df2f95f920655884be56d4024676b26943804

  • \Users\Admin\AppData\Local\Temp\b9c80a9605c34bb3472ffc193cd3e940N.exe

    Filesize

    163KB

    MD5

    b9c80a9605c34bb3472ffc193cd3e940

    SHA1

    84282604a6add4af76d2fb1470dac3d704f74a8a

    SHA256

    a546c9b5d673c8cff8faa27b716b45d6d18675ccd81d19e6ab1c8c3d7a009b8a

    SHA512

    d7ac3562372262a7c16915af742c0a407f5b66646f75dbe0777e0f77e1ce4f25e51b75d8484d3761fb715933336a34c8f0b39d86737765ed999fce4df4ce6479

  • \Users\Admin\AppData\Roaming\SystemWindows\WindowsService.exe

    Filesize

    163KB

    MD5

    bf759615592d8484a764aca62055acf6

    SHA1

    450efd8f383f0b41a1c367f30a4b01fcd19e66d9

    SHA256

    5f81854fef5925b780c71c27b56612668875ffc075d2c49543257b78b675841f

    SHA512

    916237fecf6351be8a3dca396e1e1152acebac5d30a7467c29299d677ef0c63f5d58274baf4e4ebc03833cffa8f881158870b7a2d5dfd761537a6429baf92feb

  • memory/696-457-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/696-450-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/696-243-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/1952-464-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1952-451-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2696-80-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2696-79-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2696-132-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2696-54-0x000000000040B000-0x000000000040C000-memory.dmp

    Filesize

    4KB

  • memory/2696-53-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2696-191-0x0000000002920000-0x000000000295C000-memory.dmp

    Filesize

    240KB

  • memory/2696-193-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2696-0-0x0000000000400000-0x000000000043C000-memory.dmp

    Filesize

    240KB

  • memory/2696-3-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/2956-241-0x00000000030D0000-0x000000000310C000-memory.dmp

    Filesize

    240KB

  • memory/2956-237-0x00000000030D0000-0x000000000310C000-memory.dmp

    Filesize

    240KB

  • memory/2956-238-0x00000000030D0000-0x000000000310C000-memory.dmp

    Filesize

    240KB

  • memory/2956-246-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2956-247-0x00000000030D0000-0x000000000310C000-memory.dmp

    Filesize

    240KB

  • memory/2956-250-0x00000000030D0000-0x000000000310C000-memory.dmp

    Filesize

    240KB

  • memory/2956-249-0x00000000030D0000-0x000000000310C000-memory.dmp

    Filesize

    240KB

  • memory/2956-248-0x00000000030D0000-0x000000000310C000-memory.dmp

    Filesize

    240KB

  • memory/2956-252-0x00000000030D0000-0x000000000310C000-memory.dmp

    Filesize

    240KB

  • memory/2956-239-0x00000000030D0000-0x000000000310C000-memory.dmp

    Filesize

    240KB

  • memory/2956-240-0x00000000030D0000-0x000000000310C000-memory.dmp

    Filesize

    240KB

  • memory/2956-196-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2956-460-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2956-192-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB