Analysis

  • max time kernel
    119s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    06-09-2024 01:41

General

  • Target

    6e58f01b8c6f9c74156bd4a3c1a4d840N.exe

  • Size

    89KB

  • MD5

    6e58f01b8c6f9c74156bd4a3c1a4d840

  • SHA1

    a2127dc680db9aaa4420d813d12b402ee0729ab2

  • SHA256

    c2e6bba0e03909b106d8e934fd01f5f2da51c139216f09d2feecdcd68c948e89

  • SHA512

    e43414a7c9cd3b0b1d4bf54e94238ec4caa7b25bb58c5dbd9040fc0d06a28cb2e80c2c00669429cf55b2b5b1786c7deb3d6ecc7cf077f456a014ec25dd9977c0

  • SSDEEP

    768:Qvw9816vhKQLroh4/wQRNrfrunMxVFA3b7glL:YEGh0ohl2unMxVS3Hg9

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 18 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 9 IoCs
  • Drops file in Windows directory 9 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 19 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6e58f01b8c6f9c74156bd4a3c1a4d840N.exe
    "C:\Users\Admin\AppData\Local\Temp\6e58f01b8c6f9c74156bd4a3c1a4d840N.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Windows\{E93CE9CB-80B5-4874-B8B3-FBF0B80A7CB7}.exe
      C:\Windows\{E93CE9CB-80B5-4874-B8B3-FBF0B80A7CB7}.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Windows\{6929C38C-F385-4946-990B-0AFECE3E4631}.exe
        C:\Windows\{6929C38C-F385-4946-990B-0AFECE3E4631}.exe
        3⤵
        • Boot or Logon Autostart Execution: Active Setup
        • Executes dropped EXE
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Windows\{BFDF8D03-160E-4b16-9726-1E608C4A1E73}.exe
          C:\Windows\{BFDF8D03-160E-4b16-9726-1E608C4A1E73}.exe
          4⤵
          • Boot or Logon Autostart Execution: Active Setup
          • Executes dropped EXE
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3016
          • C:\Windows\{BC2125C7-2961-466b-9A55-18185CBD890B}.exe
            C:\Windows\{BC2125C7-2961-466b-9A55-18185CBD890B}.exe
            5⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Executes dropped EXE
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2688
            • C:\Windows\{81F209C9-47E2-4caf-AF34-6D1FB190A651}.exe
              C:\Windows\{81F209C9-47E2-4caf-AF34-6D1FB190A651}.exe
              6⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Executes dropped EXE
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2300
              • C:\Windows\{CB9CB113-AA19-415c-9537-AABEDE6C6B3F}.exe
                C:\Windows\{CB9CB113-AA19-415c-9537-AABEDE6C6B3F}.exe
                7⤵
                • Boot or Logon Autostart Execution: Active Setup
                • Executes dropped EXE
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1140
                • C:\Windows\{8CAF6193-39BF-4bb0-8F57-71674922F63A}.exe
                  C:\Windows\{8CAF6193-39BF-4bb0-8F57-71674922F63A}.exe
                  8⤵
                  • Boot or Logon Autostart Execution: Active Setup
                  • Executes dropped EXE
                  • Drops file in Windows directory
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2812
                  • C:\Windows\{4E849D31-6548-464c-8EF7-BCF94CA8B60E}.exe
                    C:\Windows\{4E849D31-6548-464c-8EF7-BCF94CA8B60E}.exe
                    9⤵
                    • Boot or Logon Autostart Execution: Active Setup
                    • Executes dropped EXE
                    • Drops file in Windows directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2036
                    • C:\Windows\{75D5D706-03B8-47ee-B614-27FC2B3CBCCA}.exe
                      C:\Windows\{75D5D706-03B8-47ee-B614-27FC2B3CBCCA}.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      PID:2488
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /c del C:\Windows\{4E849~1.EXE > nul
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:1148
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c del C:\Windows\{8CAF6~1.EXE > nul
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:2020
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c del C:\Windows\{CB9CB~1.EXE > nul
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:2844
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c del C:\Windows\{81F20~1.EXE > nul
                7⤵
                • System Location Discovery: System Language Discovery
                PID:1948
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c del C:\Windows\{BC212~1.EXE > nul
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2252
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c del C:\Windows\{BFDF8~1.EXE > nul
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2628
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c del C:\Windows\{6929C~1.EXE > nul
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2956
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c del C:\Windows\{E93CE~1.EXE > nul
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2920
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\6E58F0~1.EXE > nul
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2116

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\{4E849D31-6548-464c-8EF7-BCF94CA8B60E}.exe

    Filesize

    89KB

    MD5

    8842977fdc3650786bb79d4e958a2e7b

    SHA1

    01bc3cefee46576adfcad119b289e9c905d4f3ba

    SHA256

    c584dc4d8668d32fa603f018877cb7cbc548d3207372901300d724f3e70f7d5d

    SHA512

    597ca98391a86fdfd705e22bca329b0426f3e7484caf3b9d15a5c89bd5a457fcf0fba9b8e9c7778d1e6b87e5a245681a70d54b5e85ee41aac22769184f0ba059

  • C:\Windows\{6929C38C-F385-4946-990B-0AFECE3E4631}.exe

    Filesize

    89KB

    MD5

    004b270ffde966d52419e3ff03be0412

    SHA1

    f32f3a21201cc3a498e283e03f405f15ac264a50

    SHA256

    3b05f9a5c3ab06c075b7b8384f585618aa4801d46b12667b4baf61a618517f7e

    SHA512

    48ffdcced3d5dfff84618c3e5a938c4f789c28197b07719a8ad2a72ab2b23da2e5bb79396ed2ff3e54347f07eca7367b205386a2583bf2ee56a1dd8ae265ac9d

  • C:\Windows\{75D5D706-03B8-47ee-B614-27FC2B3CBCCA}.exe

    Filesize

    89KB

    MD5

    15e64434cf797baf953cfce93ceb124b

    SHA1

    777b49c4a338fb01e627d73efd67f5cfc82aee23

    SHA256

    bc5b172a2baeb8d25ff80ef8f22032cf530d69301f45332ba7cf9ad35f7ec97a

    SHA512

    4941d355aa8c4cf529a1d3f3fcfcf5604bd38035d793367727ee527127fa6c4988fc642324188f7165844d92d1960ecde6e23c9563f046760e9e04419f5c0a00

  • C:\Windows\{81F209C9-47E2-4caf-AF34-6D1FB190A651}.exe

    Filesize

    89KB

    MD5

    dbbf7a1bc6a2d77d962d07e2e5b74058

    SHA1

    be35201543f23ff31a0a88f7dd0aee419e0f2d67

    SHA256

    7955c770c7a9b7617e5f4323f21a78da40c9ab4421881046aa73429649d26d09

    SHA512

    42b1f313dfc31824fbf555fb1d51c50f9f7655feadeccd033b972b28553fd16487c30ddeb0260b4c802628b6ee8d3b46e90671e00aa5e0bedb2aeb69846b432d

  • C:\Windows\{8CAF6193-39BF-4bb0-8F57-71674922F63A}.exe

    Filesize

    89KB

    MD5

    2210a104d35a721905878636ffc73eb3

    SHA1

    07df123fe2b67a1af22d1fd0c9b7af5ce2853715

    SHA256

    cd77e6ccf5577e76ceb09015ef74b686335e51ef50aeb362e9a6773b81d78dae

    SHA512

    46c8c1a96d7396b2c92b05e0e903ee4388b96cb0f7285e257f8db38814c0219b8daf9fd94ae6704f2c0f2ac3fa253664b3e3fa013ee110822661d65e083f0bea

  • C:\Windows\{BC2125C7-2961-466b-9A55-18185CBD890B}.exe

    Filesize

    89KB

    MD5

    a6b384bfc938131d7213a601643a106f

    SHA1

    c5b3397ea8a9124520019db2ab66c38c52703586

    SHA256

    d2c14da9a821e069cd3c12823b0a97611cf8fe9e014aff60b07bdbc4291dd271

    SHA512

    1694a3f5e81e47671d89ac37e0396c26e274f5e87b1316a7941767a07f6bc8ae76f961d2e33a7284f0bbc2e44d312ab43bd1fe7ca5418e3fbf863ec828439161

  • C:\Windows\{BFDF8D03-160E-4b16-9726-1E608C4A1E73}.exe

    Filesize

    89KB

    MD5

    3d8bb8d9c73bcd6a18cdc6784f03f1ab

    SHA1

    8a013640e6350583f301a7a6deef8580c83e50a1

    SHA256

    a5b2e88cf491e6d7c147d11b00cf147e1e492c6221ce7ee691c6d4cf1c545907

    SHA512

    bbd2a00d3416163f234aee52d78f36bf7ad2865165bca39c95a08fa0b1d82eae333a705b30120dcbc8f6ce9c66b2957ed01b2ba513cb84313adae135d4bf03f0

  • C:\Windows\{CB9CB113-AA19-415c-9537-AABEDE6C6B3F}.exe

    Filesize

    89KB

    MD5

    e80ab142d05bf26e21655685eb536295

    SHA1

    98fd5545f21dd59b523dfd87bb77a5b9aa6e616e

    SHA256

    2d38d1fef23a52e9e18062db9dfa7b4a14fc6a159dd1869af06088a2f4d0205d

    SHA512

    d0808236ee1b39f7504d7eff4bd387b729230f48c640395fd369bde864ca241d6b01a863152766fc2b6a1d62e84e6356450d98c8afa1595532ea97df0656a5e3

  • C:\Windows\{E93CE9CB-80B5-4874-B8B3-FBF0B80A7CB7}.exe

    Filesize

    89KB

    MD5

    2f8a752657fe61436c328770970667d9

    SHA1

    011a09beb791ff853f25c689e70aaa43a4a258f3

    SHA256

    b924a972a4b40ab30ea9c5c7d1e7c806cd363268fdd249c88f2192b63af17313

    SHA512

    9f17f9c425eb41e3ac893cabc9a978d1489ab46c40a733e286f550efcadaa0d64657ce5d93dab782fadc409f262e24f7c254348e58881a47f561e99882c1c6f6