Analysis

  • max time kernel
    140s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    08-09-2024 09:16

General

  • Target

    cvery.comc345785355/Setup/MetaDraw_3_1_Install.exe

  • Size

    5.2MB

  • MD5

    26c60e579a96d284997ea4e569d880e4

  • SHA1

    d92d989a1be593cb2e42d4538896a789d70632f1

  • SHA256

    fe5a7add2800029ad3d4b004fc6e9ce4470cde1b8db9315edd03ade0c7d8787f

  • SHA512

    65ccb14f32eb15e29f72d7fb34ca47f46a88ee7b3bc27e5ff4b5965b3062bb95e15212f4dc799da210830e77446dba711b38db15ecd8139446bc7423aa7020ca

  • SSDEEP

    98304:LdxU7ayy0lejrbmDsa0oA+nrUBrBazvGdGpCM3pg/aGX5wv4Mk42fEwuPuii:SayJQjvmDL07+rUBN9K2/RHutGii

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\cvery.comc345785355\Setup\MetaDraw_3_1_Install.exe
    "C:\Users\Admin\AppData\Local\Temp\cvery.comc345785355\Setup\MetaDraw_3_1_Install.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    PID:2960

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\GLK9C7F.tmp

    Filesize

    30KB

    MD5

    80af8dd09484fd57ee8c1b6c5c6267bd

    SHA1

    cd84fb24b823cf113e53a6b31b6cec6aea01745f

    SHA256

    1d079cf4785ee638ba466ecccd6776d327bc3abbfbc07ce04aecbcba1406f3f3

    SHA512

    8c160949b28115ec951084729280e6d7976df4ab96b6057b37bbe981518742c4b45474c8219743d9338ebf080fecc33779f13c899be9495f46dde37979fe3bb6

  • memory/2960-13-0x000000005F000000-0x000000005F011000-memory.dmp

    Filesize

    68KB

  • memory/2960-12-0x0000000010000000-0x000000001002A000-memory.dmp

    Filesize

    168KB