Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 02:24

General

  • Target

    139e83f547d3fb842dd5343c2d45e910N.exe

  • Size

    6.2MB

  • MD5

    139e83f547d3fb842dd5343c2d45e910

  • SHA1

    6ed165edddb22bf4cf3dcc796ca5ea731970d2c1

  • SHA256

    54cf6961a0c78c5f0d4f97038ee9b9aa9c8a5c95d727f562dfe1ad2100d66791

  • SHA512

    b551a94e0a70d4da9d43c2ab2ff87fdea46d91e2365a1cc7a9b17bddc0d50892367c9ee233a36245da9587f12d2b5a87bdb20ef08eab3bcd4f6684f68743db40

  • SSDEEP

    98304:nzJKi/Vw2NGzv3pY5VhptP+fQQR36/bkydLgV1y2LQAxHbG6cjw+DMjcwr63ejZ9:nHhyvpY/hp/I36Iydc1IAxHbG6rjYHD4

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Deletes itself 1 IoCs
  • Executes dropped EXE 6 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 13 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\139e83f547d3fb842dd5343c2d45e910N.exe
    "C:\Users\Admin\AppData\Local\Temp\139e83f547d3fb842dd5343c2d45e910N.exe"
    1⤵
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\gameofmir.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2736
      • C:\139e83f547d3fb842dd5343c2d45e910N.exe
        "\139e83f547d3fb842dd5343c2d45e910N.exe"
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3012
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\gameofmir.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\139e83f547d3fb842dd5343c2d45e910N0.exe
            "\139e83f547d3fb842dd5343c2d45e910N0.exe"
            5⤵
            • Executes dropped EXE
            • Enumerates connected drives
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:320
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c ""C:\gameofmir.bat" "
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:908
              • C:\139e83f547d3fb842dd5343c2d45e910N00.exe
                "\139e83f547d3fb842dd5343c2d45e910N00.exe"
                7⤵
                • Executes dropped EXE
                • Enumerates connected drives
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2064
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\gameofmir.bat" "
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:1568
                  • C:\139e83f547d3fb842dd5343c2d45e910N000.exe
                    "\139e83f547d3fb842dd5343c2d45e910N000.exe"
                    9⤵
                    • Executes dropped EXE
                    • Enumerates connected drives
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1960
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd /c ""C:\gameofmir.bat" "
                      10⤵
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of WriteProcessMemory
                      PID:2596
                      • C:\139e83f547d3fb842dd5343c2d45e910N0000.exe
                        "\139e83f547d3fb842dd5343c2d45e910N0000.exe"
                        11⤵
                        • Executes dropped EXE
                        • Enumerates connected drives
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2752
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c ""C:\gameofmir.bat" "
                          12⤵
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of WriteProcessMemory
                          PID:2988
                          • C:\139e83f547d3fb842dd5343c2d45e910N00000.exe
                            "\139e83f547d3fb842dd5343c2d45e910N00000.exe"
                            13⤵
                            • Executes dropped EXE
                            • Enumerates connected drives
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:536

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\139e83f547d3fb842dd5343c2d45e910N.exe

          Filesize

          6.2MB

          MD5

          139e83f547d3fb842dd5343c2d45e910

          SHA1

          6ed165edddb22bf4cf3dcc796ca5ea731970d2c1

          SHA256

          54cf6961a0c78c5f0d4f97038ee9b9aa9c8a5c95d727f562dfe1ad2100d66791

          SHA512

          b551a94e0a70d4da9d43c2ab2ff87fdea46d91e2365a1cc7a9b17bddc0d50892367c9ee233a36245da9587f12d2b5a87bdb20ef08eab3bcd4f6684f68743db40

        • C:\LoginTemp.ini

          Filesize

          30B

          MD5

          072418f231e0bf022453501d596b6b89

          SHA1

          c8e473298746f00c4f88013768417388dc202edc

          SHA256

          02498df477a6df1e5fb0e320e05b5554350e53c48178ab4fdac8a8c19b3ccda0

          SHA512

          0547c2f3c9da08ad230cd4910d04a24908dcd030ebbe499a7158f2c2bff4420946b71f91371a2345468378c90dfad804626d814f6b8031172a0ae998fe8fd8c1

        • C:\LoginTemp.ini

          Filesize

          30B

          MD5

          9b2456363290ba7d3b58b22d66ce6a18

          SHA1

          43f3a27739354d6a21dab842e5910205eb7ebe6b

          SHA256

          95b5335823c05e3acf512d08169bf4cc9925d70e96b72e83b472cb55b094e218

          SHA512

          3eceb636eb660bf20d558a396a0ac186902974e9737354577b301765407c98c94f800c62083f6e648bd576da8a84e414919a7a99144b409befea5bb86b48cbba

        • C:\Users\Admin\AppData\Local\Temp\GameLogin_Debug.txt

          Filesize

          191B

          MD5

          b1edf2e0c32922123382ac3cb79f5855

          SHA1

          75e101b0f0b3c6bca351e519bb1e25afbf7b439f

          SHA256

          abdd49b9686eb48b4cf5185bfbaec12edf5c9d749308890c24c9e76499a49679

          SHA512

          ce7116bfc38c27c8d4b60008a861fbbd74f8e6f32128bb2c47966b03600fc4cc34947a7c7bb31abb802fc74e1040e77e6f5893dfedfa4645bd54d298a14bff35

        • C:\Users\Admin\AppData\Local\Temp\gameofmir.bat

          Filesize

          245B

          MD5

          eb2182e030aaee9a1e83da445c113556

          SHA1

          ff579a41e1c68e6b3980638912f04b3759032fb0

          SHA256

          7ca472dc3a1236d18ed9b8dfe87103ae14a150917026b28a9a5ea3ddcdd84e15

          SHA512

          d59bdeff97d28e37f99fb987d2054b27145c0780d5751a7383fb9ff93f3583193cf6fac8c1762dc8e77b926b2e87a09586b288eea6431de1d9dc3c0f2cec3ae2

        • C:\Users\Admin\Desktop\´óÌÆ´«ÆæV2.0.lnk

          Filesize

          624B

          MD5

          612582ca5ce8aea91ea9f36b89aff9b9

          SHA1

          2993a7aecb1c6e178e63f90bb44365f35290c70c

          SHA256

          b1433de488508df928ea7f0c0c9b5d54de05985a32cd74e3968aed481a7b849e

          SHA512

          f7ca61eca4e4af36ea016ea75cba084b56e2dc0631504f273aa16fee59fea7c8a1c8344f184cea530f0af291c31bd7c02ce08f8bee30630af995253a39eb59c7

        • C:\Users\Admin\Desktop\´óÌÆ´«ÆæV2.0.lnk

          Filesize

          629B

          MD5

          c1edc1e2532125d060ee99de12f3bdf4

          SHA1

          0d6ce2dd5af325270469e8a3ad1f3a8e69c8ebe1

          SHA256

          f732dfdbebac7a60433f8d149254d64ba83515ebfa988c191ac8bca24b0a5441

          SHA512

          7e908672f816da3db8500db9d01f0c8ed1d7b46421f01f2d5a68e123879daf7f7afc6545faf0b729369a72872a9bbf08bc04c320b8e2ae7fb4941d04d83611a7

        • C:\Users\Admin\Desktop\´óÌÆ´«ÆæV2.0.lnk

          Filesize

          1KB

          MD5

          a569c238337b6cb62f72923e04a63ed8

          SHA1

          b373c72d1bb76e17a034811c9b49bfdb29dcad0a

          SHA256

          a589eb5877a9e1b4470e606f00c44e7d4d69a1c40a436559cc8ec19dad4892d9

          SHA512

          05e79a2850dd8d5e37928b5e4c047896e2b2a910c00fd6a31d38faabf68625ddbffc06df92de5d877665f37ba1716550c90e2f0a694f99f4f6262cff54533022

        • C:\Users\Admin\Desktop\´óÌÆ´«ÆæV2.0.lnk

          Filesize

          609B

          MD5

          20c16bd57a49fd06f55b9048e30560ee

          SHA1

          f4e35deac539d4bb5523f8839ea0861207f5036d

          SHA256

          88994803e778637acfc70a5ec9b61bdfc3acabacc4317635e4e0d0176d98d838

          SHA512

          41f472706992f997c71f19d222fc1535672f2eb8dc25c0af585926d9b3c0d3789aa450845c0bf63bf53fd647c271cf1890b1d6dbf7afdfc0e2a550cbaea37066

        • C:\Users\Admin\Desktop\´óÌÆ´«ÆæV2.0.lnk

          Filesize

          614B

          MD5

          1545fe00eb4c62ecb95025db27def4aa

          SHA1

          a6c7d4e29fcf06c7d74af38208e2f061b8a19127

          SHA256

          25e62273efac226e6e23a0973cde4cf8ab550c033d891203eb38de2663376913

          SHA512

          ef68e65d8d0d088b99bce75292dd5293b93dc44162141b175cdc578bb6abe3be38906a2ee96a3b2ad5140095e68755be0015c383d39072e39493b92d42f5787c

        • C:\Users\Admin\Desktop\´óÌÆ´«ÆæV2.0.lnk

          Filesize

          619B

          MD5

          31a1d61917ce55743a3067310e3f59b5

          SHA1

          19a7b9abf9a426e6b545a6f09c58b7c471a2f36d

          SHA256

          2b05fbbe8b8c1821470d087e6155cd10e03c68724ad2dc3cc78eab003c6081a0

          SHA512

          bbacbf73f1f94dba21000d9635e2656b9ee9bc96ae7c0e55229628ec372d872cfc1f7417ca40f3478b0879c8d0217f8d8e7a69bb5960d550e5e0b048d0591afa

        • C:\\GameLogin_Debug.txt

          Filesize

          330B

          MD5

          f76c99589a03f64ed07ab10a60032214

          SHA1

          7b4d8d70d07082b5dc17105fd1a30d9fe0637eb4

          SHA256

          0715a09f8517c01ef4e7734da4300650267bc3147007820bd2d6dcef221bd51d

          SHA512

          e019c87cb882b128a549c0ed5deb600c8f2c31e5e7c09f32ccd5595ed8404f287962a376acb22c2ebaaee7c17355ab7ca1d1d38eacacac4b42d11fe4711cd7b9

        • C:\\GameLogin_Debug.txt

          Filesize

          415B

          MD5

          0ed6c3344abfc90b68eed01934b54411

          SHA1

          c9fdac3ec27a442e3da18bdf991164e6ea4de12d

          SHA256

          1f1560139c71ca9dafd3ce84f90cea92d9d34b1f812ef6228f52603cccf24d73

          SHA512

          7f3f813920e920726b492e84d7ae2ded289c92d44d086eb073febc74302eec30c5476aaec9dd015d6b3c5fcff12a9fad4b6f794f245d7f3323153d52082b7945

        • C:\\GameLogin_Debug.txt

          Filesize

          163B

          MD5

          f94c55918d8e2c0827dd9064e8face61

          SHA1

          428547e1eda719b8f75c5cb7a830387cb5d09fae

          SHA256

          f7db70e9c727b7e6bed1da624a5033caa6226525c2583eca850fb280f583d961

          SHA512

          1b73742ad97b2af93c36b0e2272ab35d1de6c1964fc110a58639b2bc4b6350f8724d66ace9876ea72b0383bede3c5659b503f1af02f87b368717c954257f9e66

        • C:\\GameLogin_Debug.txt

          Filesize

          246B

          MD5

          1cc6e0b93d4c87c484a1007a74449c8b

          SHA1

          84b8d4e1bba063dc07c8913b2c79a99e33605ca0

          SHA256

          ce69d571846b4c771b7b7443fd5e82befcca3d25f61fea41a74be3d7685fdbe5

          SHA512

          778667ce9226cbd696bee70b8fd574b263d13c2f75273317970943fb39b9239b7c138c35f34f308f365615398f7d1b14e56b4dc90df598e3a9334f70778de6c2

        • C:\gameofmir.bat

          Filesize

          187B

          MD5

          a8d881fcef12527531f4dd4a23a40a9d

          SHA1

          04507c6ad9f285ee19cfac68253b6730848e30a5

          SHA256

          cea1f916c435c834867927bd228ddefbf3ec78027f88d4dc0e33764b0baab356

          SHA512

          b05eaa2237f76b763f950207ad0a182e4acea402a18b985ffc961872a07106ce93416c1ccd52222039cfe68fad6f7e861302a8bb3c30c80bbfe4d6f24ce55938

        • C:\gameofmir.bat

          Filesize

          190B

          MD5

          5efb4407084003ebd1123ad8873d1e29

          SHA1

          7442f8e6e28949aeab6da94983e17d961d3273e9

          SHA256

          e8169307c64b367e30ffdb4a6d2f587cd72f95fd61b9e7da91713493317f2c51

          SHA512

          736b0650dabc120d733d5d8933f7dab593bafb1f9c93b4168630230b5f0bc9510a01a79e4cef1510059bf6e6384647254164e6681b76f342d589adec409a2cfe

        • C:\gameofmir.bat

          Filesize

          184B

          MD5

          2a19f72a8318c385ffdbe0287eb229ce

          SHA1

          12588c1387f2e3dae113eed56e0abe2bde959a2e

          SHA256

          a1f89eaef49007a5509755755e1fb4b4c17b7608e077b7ded58bfcb3414930e6

          SHA512

          969d9734330d5d49ac1e8e95bb4844d517307a8c8e9391564daf605b155b9c07a2cdbe042e2b654d30268f4bb58af9b2ba92978b2ce692ea5005a4196dd6abd0

        • C:\gameofmir.bat

          Filesize

          193B

          MD5

          630eb6e04b81e4b509102789517d466c

          SHA1

          3518bf47ce344f94e4e2a3fce856db50760ede54

          SHA256

          57bc2014f2a03b5ebe6c78dc2e24278660b8de5f9a092aad8402da2172b532d7

          SHA512

          f706f1838208dcff0114cad3659ab86d0c355fc79b699cc6b6048ab42799969bfbb3030bb73218d5452f6a8110f0a267df954dbce05eb923492c60f889626532

        • C:\gameofmir.bat

          Filesize

          196B

          MD5

          3d15c7974979c25b6238c05c09b972fa

          SHA1

          c30befad601d9c27a211a4e0868b8a80125c74a5

          SHA256

          906c0ae5ae14f972b520ff14eeeed1bc2082810b83ac472ba28956ae90da72cd

          SHA512

          353f17953b7195157542ac1a8b7a00d95adea3ea5cd337bd99bf2ea3bea873e36e454d0d8c75e43ea2eb3e582b87fc23606549bc828a2b84a497bd5e1237c5b3

        • memory/320-60-0x0000000000400000-0x00000000009B4000-memory.dmp

          Filesize

          5.7MB

        • memory/320-48-0x0000000000400000-0x00000000009B4000-memory.dmp

          Filesize

          5.7MB

        • memory/1064-17-0x0000000000400000-0x00000000009B4000-memory.dmp

          Filesize

          5.7MB

        • memory/1064-1-0x0000000000442000-0x0000000000443000-memory.dmp

          Filesize

          4KB

        • memory/1064-0-0x0000000000310000-0x0000000000311000-memory.dmp

          Filesize

          4KB

        • memory/1064-4-0x0000000000310000-0x0000000000311000-memory.dmp

          Filesize

          4KB

        • memory/1064-5-0x0000000000400000-0x00000000009B4000-memory.dmp

          Filesize

          5.7MB

        • memory/1960-104-0x0000000000400000-0x00000000009B4000-memory.dmp

          Filesize

          5.7MB

        • memory/1960-92-0x0000000000400000-0x00000000009B4000-memory.dmp

          Filesize

          5.7MB

        • memory/2064-82-0x0000000000400000-0x00000000009B4000-memory.dmp

          Filesize

          5.7MB

        • memory/2064-70-0x0000000000400000-0x00000000009B4000-memory.dmp

          Filesize

          5.7MB

        • memory/2752-114-0x0000000000400000-0x00000000009B4000-memory.dmp

          Filesize

          5.7MB

        • memory/2752-126-0x0000000000400000-0x00000000009B4000-memory.dmp

          Filesize

          5.7MB

        • memory/3012-27-0x0000000000400000-0x00000000009B4000-memory.dmp

          Filesize

          5.7MB

        • memory/3012-39-0x0000000000400000-0x00000000009B4000-memory.dmp

          Filesize

          5.7MB