Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 23:33

General

  • Target

    ba85a8b17d6f55a3b5bd74d3d3a98570N.exe

  • Size

    9.4MB

  • MD5

    ba85a8b17d6f55a3b5bd74d3d3a98570

  • SHA1

    8359e9619103e4f80e08158749093315d2dd579b

  • SHA256

    cef4875b93d64c4faf1308e416504696f64263dc9f790f5736d5a1273977082a

  • SHA512

    70275e0b398d9877820e3b1a7344e8c7a627018c2e031944d9c72eb5a177e57a082e1b852bac29eba76c34375e1c1b975fe420548ea5f79091e08ce591928f93

  • SSDEEP

    196608:6s5nTuypxBRJxo85pTdvbN0Xx06IVT4B8iXt3b8r0xnaMw1oMyj73:6s5nCqBz5/x0BXIOr8rye3GT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba85a8b17d6f55a3b5bd74d3d3a98570N.exe
    "C:\Users\Admin\AppData\Local\Temp\ba85a8b17d6f55a3b5bd74d3d3a98570N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Users\Admin\AppData\Local\Temp\f7721e2\ba85a8b17d6f55a3b5bd74d3d3a98570N.exe
      run=1 shortcut="C:\Users\Admin\AppData\Local\Temp\ba85a8b17d6f55a3b5bd74d3d3a98570N.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\SC-F7200_comdrv_ACL_x64_146JAHomeExportAsia\WINVISTA_XP64\SETUP\SETUP64.EXE
        .\SC-F7200_comdrv_ACL_x64_146JAHomeExportAsia\WINVISTA_XP64\SETUP\SETUP64.EXE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Windows directory
        • Modifies Internet Explorer settings
        • Modifies system certificate store
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2572

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\EPSON\Setup\epstplog.txt

          Filesize

          8KB

          MD5

          b694d77e8239480cde35dea62aa3a783

          SHA1

          14d6d91bde9d61b781b8be65c799bf33c1af37f7

          SHA256

          6c1cd1f568d24f79d5076c643c22ded515019a7a51a0f7fbce98929bfddfee1b

          SHA512

          5ed7695a3625006459b11d6f0fa17528df6c23e4179d90083ae7b4d475c20bca17dbd1d17d46c5cdc1a6024407d01cf2dae5c36fbc817668b60a3ecd36c2272a

        • C:\Users\Admin\AppData\Local\Temp\Cab2510.tmp

          Filesize

          70KB

          MD5

          49aebf8cbd62d92ac215b2923fb1b9f5

          SHA1

          1723be06719828dda65ad804298d0431f6aff976

          SHA256

          b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

          SHA512

          bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

        • C:\Users\Admin\AppData\Local\Temp\Tar2522.tmp

          Filesize

          181KB

          MD5

          4ea6026cf93ec6338144661bf1202cd1

          SHA1

          a1dec9044f750ad887935a01430bf49322fbdcb7

          SHA256

          8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

          SHA512

          6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\SC-F7200_comdrv_ACL_x64_146JAHomeExportAsia\WINVISTA_XP64\SETUP\EPEULA64.dll

          Filesize

          3.4MB

          MD5

          d5c9763ab346ebd8b90e0ed9090823a2

          SHA1

          3021876ffa12f331941debcb95e9015d1f259831

          SHA256

          7d5b28d92d2169014691c82f7a87e76ae8c257debdca3b4a10dc1b589a75f5b5

          SHA512

          2de7d96a0f073c3057d7994bbc295ca778756c7f140ddce151eedc219ef55ac66c295e1d536851593bae104883710f5f410b08195db6f36d483ce732179ff2dd

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\SC-F7200_comdrv_ACL_x64_146JAHomeExportAsia\WINVISTA_XP64\SETUP\E_GLSDLG.dll

          Filesize

          54KB

          MD5

          4627b95b7f67c61829ef414c0a640d59

          SHA1

          e8cb6796ac87b1fd06923a61506ea7d435b3d1b0

          SHA256

          653b5a162131473865dc60ee33e9092dd78ecfc69a87488aef3d3fe5276787c8

          SHA512

          76fb03ebabec703d1fb2a7acf43cad4c091af366bbb6967d12b62b64483cf5dbad7edb98c4134fc3b80ee9fffe2f92b118d86840d7d5651f3ff0517feb3a9ea6

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\SC-F7200_comdrv_ACL_x64_146JAHomeExportAsia\WINVISTA_XP64\SETUP\SETUP64.EXE

          Filesize

          1.3MB

          MD5

          49e2aba7c0d047e311c2c3854932b0df

          SHA1

          f4aef3a1eaa109a14709b2b687002430361f9c4d

          SHA256

          4224671e06e72a919dae4cbfe278fddfe90fbd410010ea1a73c219ba7f252c17

          SHA512

          8d40a0e67dcc756d7149f58d963af313d4984aab3462d8840a1d2dbe4a28e22d5acb90653017e75075caa116859774be1693a3bf4f76a287a2ffde7979dfc046

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\SC-F7200_comdrv_ACL_x64_146JAHomeExportAsia\WINVISTA_XP64\SETUP\SETUP64.dat

          Filesize

          424KB

          MD5

          f8cad209eb776d536b8624aa219015f7

          SHA1

          0b3b970966d875d9f2df25d1cb67761555d71c68

          SHA256

          da8121fc91e2a1ef63f22d01ae60f918ce99083ac16fd291f3d76a61c3abb690

          SHA512

          3f5387acf9d7fb76562c9e818d2d1ac7b468e3b2aafae613d29c8140a67e2cde2c0f5b34264a7e1e12cf2704ed9ccfdcd33b90c91c5e791b6382411373c7d6f6

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\SC-F7200_comdrv_ACL_x64_146JAHomeExportAsia\WINVISTA_XP64\SETUP\epsetup.eif

          Filesize

          30KB

          MD5

          2f016bf82e7ce558e92a00c6999209bb

          SHA1

          a21d7d9adb6de70202b32f4c0134dd016a2285cf

          SHA256

          c69801ffc77e0f135c291f6b81384982d630e778d00c581e7908ea39a9d62648

          SHA512

          7f75c22cbab1e7cb06bcd1205e267d4d776196f4f8e1a80fa701859bbb24541ef88458805246d2ebdc3c97fbc88c7bdef49bc45e5d5af6d7202b2d028a0f5169

        • C:\Users\Admin\AppData\Local\Temp\f7721e2\ba85a8b17d6f55a3b5bd74d3d3a98570N.exe

          Filesize

          9.4MB

          MD5

          ba85a8b17d6f55a3b5bd74d3d3a98570

          SHA1

          8359e9619103e4f80e08158749093315d2dd579b

          SHA256

          cef4875b93d64c4faf1308e416504696f64263dc9f790f5736d5a1273977082a

          SHA512

          70275e0b398d9877820e3b1a7344e8c7a627018c2e031944d9c72eb5a177e57a082e1b852bac29eba76c34375e1c1b975fe420548ea5f79091e08ce591928f93

        • \??\c:\users\admin\appdata\local\temp\wzse0.tmp\sc-f7200_comdrv_acl_x64_146jahomeexportasia\winvista_xp64\E_NF21HE.CAT

          Filesize

          23KB

          MD5

          f59e606eee26bed7b74c16ff983c3174

          SHA1

          b2720f6c0a2ec10ea304eee42ce3ddcc4a72f3d6

          SHA256

          5915ea7fc929c268673287c931688e923053c6d3f2ac129e1c7b552629f5c5b4

          SHA512

          91403dbdf0fbe001c3fad06fe93df7b22bd28d0ab93bfc7e8d8b592da0e210fb7c93d5a58abddcd1aa5ee9e75013f362b8cf863a0f72a4480f6803c402232b6f

        • \??\c:\users\admin\appdata\local\temp\wzse0.tmp\sc-f7200_comdrv_acl_x64_146jahomeexportasia\winvista_xp64\e_nf21he.inf

          Filesize

          4KB

          MD5

          ec6aeadd4bd2f07c3c7daac9728f4606

          SHA1

          00ec247fb9777f4af327f6b4fdef012481654216

          SHA256

          48767362bc2931f10b8acdcb94bbfaf38a509542a13ced6639afffd7579f5ef4

          SHA512

          b70f4601b7ffd1395a7857ec08ad291ce1509795684d02fbb7dc0bae02106f06018d916ccfecdc9a383a0bf01c91ee72456a58be6024006f2d33afc9ae5d13e6