Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06/09/2024, 01:41 UTC

General

  • Target

    6e58f01b8c6f9c74156bd4a3c1a4d840N.exe

  • Size

    89KB

  • MD5

    6e58f01b8c6f9c74156bd4a3c1a4d840

  • SHA1

    a2127dc680db9aaa4420d813d12b402ee0729ab2

  • SHA256

    c2e6bba0e03909b106d8e934fd01f5f2da51c139216f09d2feecdcd68c948e89

  • SHA512

    e43414a7c9cd3b0b1d4bf54e94238ec4caa7b25bb58c5dbd9040fc0d06a28cb2e80c2c00669429cf55b2b5b1786c7deb3d6ecc7cf077f456a014ec25dd9977c0

  • SSDEEP

    768:Qvw9816vhKQLroh4/wQRNrfrunMxVFA3b7glL:YEGh0ohl2unMxVS3Hg9

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e58f01b8c6f9c74156bd4a3c1a4d840N.exe
    "C:\Users\Admin\AppData\Local\Temp\6e58f01b8c6f9c74156bd4a3c1a4d840N.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Windows\{E93CE9CB-80B5-4874-B8B3-FBF0B80A7CB7}.exe
      C:\Windows\{E93CE9CB-80B5-4874-B8B3-FBF0B80A7CB7}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Windows\{6929C38C-F385-4946-990B-0AFECE3E4631}.exe
        C:\Windows\{6929C38C-F385-4946-990B-0AFECE3E4631}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Windows\{BFDF8D03-160E-4b16-9726-1E608C4A1E73}.exe
          C:\Windows\{BFDF8D03-160E-4b16-9726-1E608C4A1E73}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3016
          • C:\Windows\{BC2125C7-2961-466b-9A55-18185CBD890B}.exe
            C:\Windows\{BC2125C7-2961-466b-9A55-18185CBD890B}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2688
            • C:\Windows\{81F209C9-47E2-4caf-AF34-6D1FB190A651}.exe
              C:\Windows\{81F209C9-47E2-4caf-AF34-6D1FB190A651}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2300
              • C:\Windows\{CB9CB113-AA19-415c-9537-AABEDE6C6B3F}.exe
                C:\Windows\{CB9CB113-AA19-415c-9537-AABEDE6C6B3F}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1140
                • C:\Windows\{8CAF6193-39BF-4bb0-8F57-71674922F63A}.exe
                  C:\Windows\{8CAF6193-39BF-4bb0-8F57-71674922F63A}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2812
                  • C:\Windows\{4E849D31-6548-464c-8EF7-BCF94CA8B60E}.exe
                    C:\Windows\{4E849D31-6548-464c-8EF7-BCF94CA8B60E}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2036
                    • C:\Windows\{75D5D706-03B8-47ee-B614-27FC2B3CBCCA}.exe
                      C:\Windows\{75D5D706-03B8-47ee-B614-27FC2B3CBCCA}.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:2488
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{4E849~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:1148
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{8CAF6~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:2020
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{CB9CB~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2844
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{81F20~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1948
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{BC212~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2252
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{BFDF8~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2628
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{6929C~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2956
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{E93CE~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2920
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\6E58F0~1.EXE > nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{4E849D31-6548-464c-8EF7-BCF94CA8B60E}.exe

    Filesize

    89KB

    MD5

    8842977fdc3650786bb79d4e958a2e7b

    SHA1

    01bc3cefee46576adfcad119b289e9c905d4f3ba

    SHA256

    c584dc4d8668d32fa603f018877cb7cbc548d3207372901300d724f3e70f7d5d

    SHA512

    597ca98391a86fdfd705e22bca329b0426f3e7484caf3b9d15a5c89bd5a457fcf0fba9b8e9c7778d1e6b87e5a245681a70d54b5e85ee41aac22769184f0ba059

  • C:\Windows\{6929C38C-F385-4946-990B-0AFECE3E4631}.exe

    Filesize

    89KB

    MD5

    004b270ffde966d52419e3ff03be0412

    SHA1

    f32f3a21201cc3a498e283e03f405f15ac264a50

    SHA256

    3b05f9a5c3ab06c075b7b8384f585618aa4801d46b12667b4baf61a618517f7e

    SHA512

    48ffdcced3d5dfff84618c3e5a938c4f789c28197b07719a8ad2a72ab2b23da2e5bb79396ed2ff3e54347f07eca7367b205386a2583bf2ee56a1dd8ae265ac9d

  • C:\Windows\{75D5D706-03B8-47ee-B614-27FC2B3CBCCA}.exe

    Filesize

    89KB

    MD5

    15e64434cf797baf953cfce93ceb124b

    SHA1

    777b49c4a338fb01e627d73efd67f5cfc82aee23

    SHA256

    bc5b172a2baeb8d25ff80ef8f22032cf530d69301f45332ba7cf9ad35f7ec97a

    SHA512

    4941d355aa8c4cf529a1d3f3fcfcf5604bd38035d793367727ee527127fa6c4988fc642324188f7165844d92d1960ecde6e23c9563f046760e9e04419f5c0a00

  • C:\Windows\{81F209C9-47E2-4caf-AF34-6D1FB190A651}.exe

    Filesize

    89KB

    MD5

    dbbf7a1bc6a2d77d962d07e2e5b74058

    SHA1

    be35201543f23ff31a0a88f7dd0aee419e0f2d67

    SHA256

    7955c770c7a9b7617e5f4323f21a78da40c9ab4421881046aa73429649d26d09

    SHA512

    42b1f313dfc31824fbf555fb1d51c50f9f7655feadeccd033b972b28553fd16487c30ddeb0260b4c802628b6ee8d3b46e90671e00aa5e0bedb2aeb69846b432d

  • C:\Windows\{8CAF6193-39BF-4bb0-8F57-71674922F63A}.exe

    Filesize

    89KB

    MD5

    2210a104d35a721905878636ffc73eb3

    SHA1

    07df123fe2b67a1af22d1fd0c9b7af5ce2853715

    SHA256

    cd77e6ccf5577e76ceb09015ef74b686335e51ef50aeb362e9a6773b81d78dae

    SHA512

    46c8c1a96d7396b2c92b05e0e903ee4388b96cb0f7285e257f8db38814c0219b8daf9fd94ae6704f2c0f2ac3fa253664b3e3fa013ee110822661d65e083f0bea

  • C:\Windows\{BC2125C7-2961-466b-9A55-18185CBD890B}.exe

    Filesize

    89KB

    MD5

    a6b384bfc938131d7213a601643a106f

    SHA1

    c5b3397ea8a9124520019db2ab66c38c52703586

    SHA256

    d2c14da9a821e069cd3c12823b0a97611cf8fe9e014aff60b07bdbc4291dd271

    SHA512

    1694a3f5e81e47671d89ac37e0396c26e274f5e87b1316a7941767a07f6bc8ae76f961d2e33a7284f0bbc2e44d312ab43bd1fe7ca5418e3fbf863ec828439161

  • C:\Windows\{BFDF8D03-160E-4b16-9726-1E608C4A1E73}.exe

    Filesize

    89KB

    MD5

    3d8bb8d9c73bcd6a18cdc6784f03f1ab

    SHA1

    8a013640e6350583f301a7a6deef8580c83e50a1

    SHA256

    a5b2e88cf491e6d7c147d11b00cf147e1e492c6221ce7ee691c6d4cf1c545907

    SHA512

    bbd2a00d3416163f234aee52d78f36bf7ad2865165bca39c95a08fa0b1d82eae333a705b30120dcbc8f6ce9c66b2957ed01b2ba513cb84313adae135d4bf03f0

  • C:\Windows\{CB9CB113-AA19-415c-9537-AABEDE6C6B3F}.exe

    Filesize

    89KB

    MD5

    e80ab142d05bf26e21655685eb536295

    SHA1

    98fd5545f21dd59b523dfd87bb77a5b9aa6e616e

    SHA256

    2d38d1fef23a52e9e18062db9dfa7b4a14fc6a159dd1869af06088a2f4d0205d

    SHA512

    d0808236ee1b39f7504d7eff4bd387b729230f48c640395fd369bde864ca241d6b01a863152766fc2b6a1d62e84e6356450d98c8afa1595532ea97df0656a5e3

  • C:\Windows\{E93CE9CB-80B5-4874-B8B3-FBF0B80A7CB7}.exe

    Filesize

    89KB

    MD5

    2f8a752657fe61436c328770970667d9

    SHA1

    011a09beb791ff853f25c689e70aaa43a4a258f3

    SHA256

    b924a972a4b40ab30ea9c5c7d1e7c806cd363268fdd249c88f2192b63af17313

    SHA512

    9f17f9c425eb41e3ac893cabc9a978d1489ab46c40a733e286f550efcadaa0d64657ce5d93dab782fadc409f262e24f7c254348e58881a47f561e99882c1c6f6

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.