Analysis

  • max time kernel
    141s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 23:09

General

  • Target

    afc82c2443e9d26629bdd8656b4f18514f3bcd16bbc0fbde750d519a874ae8dd.exe

  • Size

    7.9MB

  • MD5

    154453cfde08209fec51635ae6e19a3a

  • SHA1

    2d044f22cb7419bf932b14a784c3a5f7811a577e

  • SHA256

    afc82c2443e9d26629bdd8656b4f18514f3bcd16bbc0fbde750d519a874ae8dd

  • SHA512

    61da37729f5f9b67250f4a616444ee03f1a52e6b1ca3812d10c75805e6771e37e4f53daaf80c933288b78ca306956b058b8883f66e954faa116d842f5051b6f2

  • SSDEEP

    196608:87azg7DSm7azg7DSm7azg7DSm7azg7DSN:zg7uFg7uFg7uFg7uN

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afc82c2443e9d26629bdd8656b4f18514f3bcd16bbc0fbde750d519a874ae8dd.exe
    "C:\Users\Admin\AppData\Local\Temp\afc82c2443e9d26629bdd8656b4f18514f3bcd16bbc0fbde750d519a874ae8dd.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Windows\SysWOW64\reg.exe
      "C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f
      2⤵
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry key
      PID:2788
    • C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe
      "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2648
      • C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe
        "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:2008
    • C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe
      "C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2348

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe

    Filesize

    7.9MB

    MD5

    d4ab8eab9c1adfc680fa763a5d964524

    SHA1

    acad21b464b0e7d39bc334896da325f8f85f1734

    SHA256

    a5877976816bb8c43b253fca31968eb33d89b02d0e335fc65b67bc794cf2b062

    SHA512

    f4dceaa09102831c59ce81cfd9f19121e4005297bd8af2aa0a74ccd667be504ded06e47c9b8d415665d66d764a6e7ad57bc05caa342ec9a07f6df7add7183e21

  • C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe

    Filesize

    1.0MB

    MD5

    a2f259ceb892d3b0d1d121997c8927e3

    SHA1

    6e0a7239822b8d365d690a314f231286355f6cc6

    SHA256

    ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420

    SHA512

    5ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad

  • memory/684-0-0x0000000000230000-0x0000000000231000-memory.dmp

    Filesize

    4KB

  • memory/684-1-0x0000000000400000-0x0000000000601000-memory.dmp

    Filesize

    2.0MB

  • memory/684-2-0x0000000000400000-0x0000000000601000-memory.dmp

    Filesize

    2.0MB

  • memory/684-20-0x0000000000400000-0x0000000000601000-memory.dmp

    Filesize

    2.0MB

  • memory/2008-46-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/2008-45-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2008-44-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/2008-49-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/2008-51-0x0000000000400000-0x00000000004A6000-memory.dmp

    Filesize

    664KB

  • memory/2348-39-0x0000000000400000-0x00000000004FB000-memory.dmp

    Filesize

    1004KB

  • memory/2648-38-0x0000000000400000-0x0000000000601000-memory.dmp

    Filesize

    2.0MB

  • memory/2648-40-0x0000000000400000-0x0000000000601000-memory.dmp

    Filesize

    2.0MB

  • memory/2648-48-0x0000000000400000-0x0000000000601000-memory.dmp

    Filesize

    2.0MB

  • memory/2648-13-0x0000000000220000-0x0000000000221000-memory.dmp

    Filesize

    4KB