Analysis

  • max time kernel
    96s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/09/2024, 23:33

General

  • Target

    ba85a8b17d6f55a3b5bd74d3d3a98570N.exe

  • Size

    9.4MB

  • MD5

    ba85a8b17d6f55a3b5bd74d3d3a98570

  • SHA1

    8359e9619103e4f80e08158749093315d2dd579b

  • SHA256

    cef4875b93d64c4faf1308e416504696f64263dc9f790f5736d5a1273977082a

  • SHA512

    70275e0b398d9877820e3b1a7344e8c7a627018c2e031944d9c72eb5a177e57a082e1b852bac29eba76c34375e1c1b975fe420548ea5f79091e08ce591928f93

  • SSDEEP

    196608:6s5nTuypxBRJxo85pTdvbN0Xx06IVT4B8iXt3b8r0xnaMw1oMyj73:6s5nCqBz5/x0BXIOr8rye3GT

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba85a8b17d6f55a3b5bd74d3d3a98570N.exe
    "C:\Users\Admin\AppData\Local\Temp\ba85a8b17d6f55a3b5bd74d3d3a98570N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Users\Admin\AppData\Local\Temp\e57a21c\ba85a8b17d6f55a3b5bd74d3d3a98570N.exe
      run=1 shortcut="C:\Users\Admin\AppData\Local\Temp\ba85a8b17d6f55a3b5bd74d3d3a98570N.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:816
      • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\SC-F7200_comdrv_ACL_x64_146JAHomeExportAsia\WINVISTA_XP64\SETUP\SETUP64.EXE
        .\SC-F7200_comdrv_ACL_x64_146JAHomeExportAsia\WINVISTA_XP64\SETUP\SETUP64.EXE
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        PID:3528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\epstplog.txt

    Filesize

    4KB

    MD5

    3327cd70c0d09ddc8e15901a99503ba0

    SHA1

    ce9184664fd9c8a68b9c822455072f12a893ac37

    SHA256

    d4db66c76266981e855dd17f5473e84e4fdb2dfedfd515d4d249d9046b9514f6

    SHA512

    f1c7a29d4537786de1e04eb847c6415a15fde6df36fd09f4b61ce86de519e5b95c871fdb231496733e3c7eb76a4ab11afbaaa79d203a7b91d9e06b18e6ab984c

  • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\SC-F7200_comdrv_ACL_x64_146JAHomeExportAsia\WINVISTA_XP64\SETUP\EPEULA64.dll

    Filesize

    3.4MB

    MD5

    d5c9763ab346ebd8b90e0ed9090823a2

    SHA1

    3021876ffa12f331941debcb95e9015d1f259831

    SHA256

    7d5b28d92d2169014691c82f7a87e76ae8c257debdca3b4a10dc1b589a75f5b5

    SHA512

    2de7d96a0f073c3057d7994bbc295ca778756c7f140ddce151eedc219ef55ac66c295e1d536851593bae104883710f5f410b08195db6f36d483ce732179ff2dd

  • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\SC-F7200_comdrv_ACL_x64_146JAHomeExportAsia\WINVISTA_XP64\SETUP\E_GLSDLG.dll

    Filesize

    54KB

    MD5

    4627b95b7f67c61829ef414c0a640d59

    SHA1

    e8cb6796ac87b1fd06923a61506ea7d435b3d1b0

    SHA256

    653b5a162131473865dc60ee33e9092dd78ecfc69a87488aef3d3fe5276787c8

    SHA512

    76fb03ebabec703d1fb2a7acf43cad4c091af366bbb6967d12b62b64483cf5dbad7edb98c4134fc3b80ee9fffe2f92b118d86840d7d5651f3ff0517feb3a9ea6

  • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\SC-F7200_comdrv_ACL_x64_146JAHomeExportAsia\WINVISTA_XP64\SETUP\SETUP64.dat

    Filesize

    424KB

    MD5

    f8cad209eb776d536b8624aa219015f7

    SHA1

    0b3b970966d875d9f2df25d1cb67761555d71c68

    SHA256

    da8121fc91e2a1ef63f22d01ae60f918ce99083ac16fd291f3d76a61c3abb690

    SHA512

    3f5387acf9d7fb76562c9e818d2d1ac7b468e3b2aafae613d29c8140a67e2cde2c0f5b34264a7e1e12cf2704ed9ccfdcd33b90c91c5e791b6382411373c7d6f6

  • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\SC-F7200_comdrv_ACL_x64_146JAHomeExportAsia\WINVISTA_XP64\SETUP\epsetup.eif

    Filesize

    30KB

    MD5

    2f016bf82e7ce558e92a00c6999209bb

    SHA1

    a21d7d9adb6de70202b32f4c0134dd016a2285cf

    SHA256

    c69801ffc77e0f135c291f6b81384982d630e778d00c581e7908ea39a9d62648

    SHA512

    7f75c22cbab1e7cb06bcd1205e267d4d776196f4f8e1a80fa701859bbb24541ef88458805246d2ebdc3c97fbc88c7bdef49bc45e5d5af6d7202b2d028a0f5169

  • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\SC-F7200_comdrv_ACL_x64_146JAHomeExportAsia\WINVISTA_XP64\setup\SETUP64.EXE

    Filesize

    1.3MB

    MD5

    49e2aba7c0d047e311c2c3854932b0df

    SHA1

    f4aef3a1eaa109a14709b2b687002430361f9c4d

    SHA256

    4224671e06e72a919dae4cbfe278fddfe90fbd410010ea1a73c219ba7f252c17

    SHA512

    8d40a0e67dcc756d7149f58d963af313d4984aab3462d8840a1d2dbe4a28e22d5acb90653017e75075caa116859774be1693a3bf4f76a287a2ffde7979dfc046

  • C:\Users\Admin\AppData\Local\Temp\e57a21c\ba85a8b17d6f55a3b5bd74d3d3a98570N.exe

    Filesize

    9.4MB

    MD5

    ba85a8b17d6f55a3b5bd74d3d3a98570

    SHA1

    8359e9619103e4f80e08158749093315d2dd579b

    SHA256

    cef4875b93d64c4faf1308e416504696f64263dc9f790f5736d5a1273977082a

    SHA512

    70275e0b398d9877820e3b1a7344e8c7a627018c2e031944d9c72eb5a177e57a082e1b852bac29eba76c34375e1c1b975fe420548ea5f79091e08ce591928f93

  • \??\c:\users\admin\appdata\local\temp\wzse0.tmp\sc-f7200_comdrv_acl_x64_146jahomeexportasia\winvista_xp64\E_NF21HE.CAT

    Filesize

    23KB

    MD5

    f59e606eee26bed7b74c16ff983c3174

    SHA1

    b2720f6c0a2ec10ea304eee42ce3ddcc4a72f3d6

    SHA256

    5915ea7fc929c268673287c931688e923053c6d3f2ac129e1c7b552629f5c5b4

    SHA512

    91403dbdf0fbe001c3fad06fe93df7b22bd28d0ab93bfc7e8d8b592da0e210fb7c93d5a58abddcd1aa5ee9e75013f362b8cf863a0f72a4480f6803c402232b6f

  • \??\c:\users\admin\appdata\local\temp\wzse0.tmp\sc-f7200_comdrv_acl_x64_146jahomeexportasia\winvista_xp64\e_nf21he.inf

    Filesize

    4KB

    MD5

    ec6aeadd4bd2f07c3c7daac9728f4606

    SHA1

    00ec247fb9777f4af327f6b4fdef012481654216

    SHA256

    48767362bc2931f10b8acdcb94bbfaf38a509542a13ced6639afffd7579f5ef4

    SHA512

    b70f4601b7ffd1395a7857ec08ad291ce1509795684d02fbb7dc0bae02106f06018d916ccfecdc9a383a0bf01c91ee72456a58be6024006f2d33afc9ae5d13e6