Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-09-2024 03:38

General

  • Target

    4b4267806c13daa2299e2f53d3758af0N.exe

  • Size

    9.6MB

  • MD5

    4b4267806c13daa2299e2f53d3758af0

  • SHA1

    a4ff8e1151507498c739b610630df1492863173c

  • SHA256

    e1c0734cc667ac700ba1e95da2185caa19d002b775507638208ba1dc4a7f5f99

  • SHA512

    f49e46d13ad0a753e5667b302dbcbda3e6d98e0d4e5c76e84016df5bf442d7f18f6346570f5b1a9a09049aa2686a3c52c2eefd7ad610d3ea4cca0116c1923ccd

  • SSDEEP

    196608:I3qnhgJuP3LAhCiVXOWv06A1oMuWr45hrr2s:nS+LJ9eJWGhrr2s

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 16 IoCs
  • Adds Run key to start application 2 TTPs 9 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Program Files directory 15 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 15 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4b4267806c13daa2299e2f53d3758af0N.exe
    "C:\Users\Admin\AppData\Local\Temp\4b4267806c13daa2299e2f53d3758af0N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2104
    • \??\c:\program files (x86)\windows nt\tabletextservice\es-es\systemwindows.exe
      "c:\program files (x86)\windows nt\tabletextservice\es-es\systemwindows.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1640
    • \??\c:\program files (x86)\common files\system\ole db\msdascmsdaurl6.1.7600.163857.0907131255.exe
      "c:\program files (x86)\common files\system\ole db\msdascmsdaurl6.1.7600.163857.0907131255.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2044
    • \??\c:\program files (x86)\common files\microsoft shared\vba\vba6\visualvbe6ext.exe
      "c:\program files (x86)\common files\microsoft shared\vba\vba6\visualvbe6ext.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:2348
    • \??\c:\program files (x86)\common files\microsoft shared\portal\portalconnectcoreportalconnectcore.exe
      "c:\program files (x86)\common files\microsoft shared\portal\portalconnectcoreportalconnectcore.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Suspicious behavior: EnumeratesProcesses
      PID:1864

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Common Files\System\Ole DB\msdascmsdaurl6.1.7600.163857.0907131255.exe

    Filesize

    9.6MB

    MD5

    148a760221fae23b0af24ad1e839533e

    SHA1

    8af2cdad0758b6f122dfaba5edfe7b6f1adf757e

    SHA256

    a52ddf5949e42d53681f89e5232b40e5fb8c29aa9f88037d30e9d4a5d66cdaa9

    SHA512

    3d8b48332242bca6b958e88f271411522bb5dba561eccce155e249dc88e21f0fc6590955c57cdce9a39bf972039729f1509e3ce629001f4a72f649a2bd83aebb

  • C:\Program Files (x86)\Common Files\microsoft shared\Portal\PortalConnectCorePortalConnectCore.exe

    Filesize

    9.6MB

    MD5

    d837579e323aa523577a6ea5427e92af

    SHA1

    3390e00f14de80f1e70391e2323f2f18347b6221

    SHA256

    c3660c51d7a08d2a46e0de62f4800354582c3a6f89b880746ad1a2440633b924

    SHA512

    1d589f5608e20a3743ca2211dd3f546c2c60be46975c4e9ecd94a0d101811bc047505d365f69ecf8e89319a6764bb03b16426876f31febfe9f499ac5c6459346

  • C:\Program Files (x86)\Internet Explorer\en-US\iexploreInternet.exe

    Filesize

    9.6MB

    MD5

    4b4267806c13daa2299e2f53d3758af0

    SHA1

    a4ff8e1151507498c739b610630df1492863173c

    SHA256

    e1c0734cc667ac700ba1e95da2185caa19d002b775507638208ba1dc4a7f5f99

    SHA512

    f49e46d13ad0a753e5667b302dbcbda3e6d98e0d4e5c76e84016df5bf442d7f18f6346570f5b1a9a09049aa2686a3c52c2eefd7ad610d3ea4cca0116c1923ccd

  • C:\Program Files (x86)\Reference Assemblies\Microsoft\Framework\v3.5\RCXE16C.tmp

    Filesize

    9.6MB

    MD5

    d2c31e754caadd494360ac327a3d2259

    SHA1

    2cd5528f63b2971aba344848c9de73f4871a9d7c

    SHA256

    0c1a34436ff610f480ffd9e08218f49e6e495fd557ca4990c75ac97b0af2dce0

    SHA512

    42bcd82e0210bdbc2c5e736a83781286b4f488ec98857ffa5834b256e9a86e43cc30bf38a7021e7961a7e09ee18b169d9d5f91c84a3e296fc261db04633488ef

  • \Program Files (x86)\Common Files\microsoft shared\VBA\VBA6\VisualVbe6Ext.exe

    Filesize

    9.6MB

    MD5

    b60f82d36073fea4ea87becd2cde3fae

    SHA1

    b472101b8303fd4ca853ee584e3236d5014ae9c9

    SHA256

    0ead721407123d0551e0ed81fcca02c62ba4c7a8242b1c6b0517081adfd2a1a4

    SHA512

    bce093deaaa025c73cac2ad661b978d0470f57d12d9baaedca26e33f30d32516a336407f4fe72cb6c6d54cb52f1b706da9e2b3e53b29a2c9803bb8a7179c0364