Analysis

  • max time kernel
    119s
  • max time network
    61s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-09-2024 12:29

General

  • Target

    0c305aa7e29543ed07b581fb035d44f0N.exe

  • Size

    123KB

  • MD5

    0c305aa7e29543ed07b581fb035d44f0

  • SHA1

    f9297fb44a8ada5202d38845c41f27e9069dff02

  • SHA256

    56a0ef6b4418afd3eca2b852c8f0efdace0363f826007b440fb8227952a4068b

  • SHA512

    a58baabe33556b7a6918993ddd1736ef876e4c0ecdc75faf693825fc4e5003c5dcc4a9c385e83a40ca4b16d6e9449ede38fbb4527424bbc71b5d004e952b5e07

  • SSDEEP

    1536:bW+gAu7KvYjk4p+NLMwL4csFkcUbVuyfjDLYujjX4m4GuDOHXVUUqpJtq9rY+OLT:aqwgG8h+S4y/LYKMXpD2ypjq9rY+O

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 24 IoCs
  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops autorun.inf file 1 TTPs 1 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c305aa7e29543ed07b581fb035d44f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\0c305aa7e29543ed07b581fb035d44f0N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\0c305aa7e29543ed07b581fb035d44f0N.exe
      74
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Loads dropped DLL
      • Adds Run key to start application
      • Maps connected drives based on registry
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Users\Admin\kioug.exe
        "C:\Users\Admin\kioug.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2772
        • C:\Users\Admin\kioug.exe
          74
          4⤵
          • Modifies visiblity of hidden/system files in Explorer
          • Executes dropped EXE
          • Adds Run key to start application
          • Maps connected drives based on registry
          • Drops autorun.inf file
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          PID:2316

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\c\Porn.exe

    Filesize

    123KB

    MD5

    83222bae53a8ff644998d8b3a78b0522

    SHA1

    c76fb08f5088100dd094e9747c09c062496360d3

    SHA256

    158a0d1d98887659ea34f54fdad7eebcd92eb41d66b23fb19ad06010f31bd3ef

    SHA512

    100636d4ccf43fd69f1a75597bcfccbd23beb28b1179aade56aa4da975d19f986c1f6d040a1bf6f4b16f8a01e2b6873ac8c7f77780606ab7b40338422ba3961c

  • C:\Users\Admin\c\RCXC8B1.tmp

    Filesize

    123KB

    MD5

    e87a2ebc6e97cb54e774f353eb4385b2

    SHA1

    8512e2a3aabcdd3a12131a49385415a44fb979bf

    SHA256

    c02b398d3831b8f3f06cf306e4811e6e498d3d1d2244d820e1c554a5acbd4f25

    SHA512

    a1acdd562543c0266dacdf817668f4f06a2a91624791d24b3a59664e33c35738fa3d3129aeb4631600665641498e70dc19c04cb050824caf62997ca16ed9c0a2

  • C:\Users\Admin\kioug.exe

    Filesize

    123KB

    MD5

    0c305aa7e29543ed07b581fb035d44f0

    SHA1

    f9297fb44a8ada5202d38845c41f27e9069dff02

    SHA256

    56a0ef6b4418afd3eca2b852c8f0efdace0363f826007b440fb8227952a4068b

    SHA512

    a58baabe33556b7a6918993ddd1736ef876e4c0ecdc75faf693825fc4e5003c5dcc4a9c385e83a40ca4b16d6e9449ede38fbb4527424bbc71b5d004e952b5e07

  • memory/2316-81-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2316-75-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2316-29-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2316-87-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2316-85-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2316-83-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2316-69-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2316-79-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2316-71-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2316-77-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2316-73-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3032-76-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3032-2-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3032-28-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3032-72-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3032-78-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3032-70-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3032-80-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3032-74-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3032-82-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3032-68-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3032-84-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3032-4-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3032-86-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/3032-27-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB