Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    08/09/2024, 17:02

General

  • Target

    8b7b79653383122831264451b8b1db1ee7ec0a9a0efbb097a30107b5a236ad7d.exe

  • Size

    76KB

  • MD5

    6ea5f9a503ee8d481cc0d2a85a315a4c

  • SHA1

    97981ac3f97d88b5534ed2a2ad821abca9766c62

  • SHA256

    8b7b79653383122831264451b8b1db1ee7ec0a9a0efbb097a30107b5a236ad7d

  • SHA512

    fcbec4938a37437b6a3bab7b6dd4f9d19b94b8252abd0d5bff8255472f64970b9c4d11dd65a8cf290113d9ecdebe4371aef65566530232c75ccc05834d0f09e4

  • SSDEEP

    1536:RshfSWHHNvoLqNwDDGw02eQmh0HjWOqY+:GhfxHNIreQm+HiRY+

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8b7b79653383122831264451b8b1db1ee7ec0a9a0efbb097a30107b5a236ad7d.exe
    "C:\Users\Admin\AppData\Local\Temp\8b7b79653383122831264451b8b1db1ee7ec0a9a0efbb097a30107b5a236ad7d.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2648

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\notepad¢¬.exe

          Filesize

          83KB

          MD5

          cf7e9feb03252acd4c14bdcc85d95a9a

          SHA1

          2e7847fef21fab1b829d64a1d7bc360a82c010b6

          SHA256

          18eed3856462f5630716b3658dd75f968d93c3ab39f6a36334f6250302ac2a18

          SHA512

          b6c5a81f6ec0d8b33ab61e207aba1a068bf9ce5119598f3c846b5ab1aaf5f722f3700f42851f0ef356b24ddb1d4368466603c2ef8a448eeb0c6997f811a49f44

        • \Windows\system\rundll32.exe

          Filesize

          81KB

          MD5

          256058b5be647119b012f76c212df182

          SHA1

          8bd67ad3060a39dcf911c17d7f66eda668dd2659

          SHA256

          cea72dab7379aa5b9b3f6ca82bd2736d2b0cd6e64dcc67fec35e9d16541650ad

          SHA512

          6bd1f22384c79eb216200ee8cda7581d96a52e4f0dbea2936be1acee3a2a6fbcbd874424abf4a651e47a8dd7ba0e73961945609d008116128b5de75485f16a52

        • memory/2648-22-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/2792-0-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB

        • memory/2792-12-0x00000000004A0000-0x00000000004B6000-memory.dmp

          Filesize

          88KB

        • memory/2792-17-0x00000000004A0000-0x00000000004B6000-memory.dmp

          Filesize

          88KB

        • memory/2792-21-0x00000000004A0000-0x00000000004A6000-memory.dmp

          Filesize

          24KB

        • memory/2792-20-0x0000000000400000-0x0000000000415A00-memory.dmp

          Filesize

          86KB