Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 23:39

General

  • Target

    (x64bit.)_v7.0.21.01.09_patch.exe

  • Size

    853KB

  • MD5

    61c6de9ef2d61f6d77de86f9b3d6f848

  • SHA1

    a1e434c61d797122cbb345b28ccbc90d2a0a76df

  • SHA256

    ba5fc4658d6a7f57f9794725aff0d09489680fe3b9c818d682dab6a8eb795606

  • SHA512

    fd6240a863462af7dfcdd6f0c5e8001762427aa88c9e3a89b0ca6b16b6a4c16885dba1334b15f4c0ce9b8122c28b301eb3ec4d8ea41872c685845a4b2c9e5801

  • SSDEEP

    24576:Bv+nMxZlyVc/Is38RGI5hrAZr0i0pcnggWlV:pjnlQcws36Gr14V

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\(x64bit.)_v7.0.21.01.09_patch.exe
    "C:\Users\Admin\AppData\Local\Temp\(x64bit.)_v7.0.21.01.09_patch.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:3032

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\bassmod.dll

    Filesize

    9KB

    MD5

    780d14604d49e3c634200c523def8351

    SHA1

    e208ef6f421d2260070a9222f1f918f1de0a8eeb

    SHA256

    844eb66a10b848d3a71a8c63c35f0a01550a46d2ff8503e2ca8947978b03b4d2

    SHA512

    a49c030f11da8f0cdc4205c86bec00653ec2f8899983cad9d7195fd23255439291aaec5a7e128e1a103efd93b8566e86f15af89eba4efebf9debce14a7a5564b

  • \Users\Admin\AppData\Local\Temp\dup2patcher.dll

    Filesize

    839KB

    MD5

    f37a6ecb58bf46d219836fa190eff225

    SHA1

    91b1f8e1db1028e6bf561b895d4fda794dc4defc

    SHA256

    c73bfb202e8f6eb847a211596ffaee38c950b786f5b08a21c456bea1865c53a4

    SHA512

    eb9fd4dadf52f46c83fc7835d3388be04dabdbb247b20a8ca55c8d0b8ccd2b39459e0e608a534df9888074542a5bad308aace8cb8f4d6c27ef4e31b70ba9f324

  • memory/3032-3-0x0000000074D20000-0x0000000074E0A000-memory.dmp

    Filesize

    936KB

  • memory/3032-7-0x0000000074D20000-0x0000000074E0A000-memory.dmp

    Filesize

    936KB