Analysis

  • max time kernel
    120s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 11:12

General

  • Target

    9296681b3bd964231c259027b9cbe07ae501f523689dfaf9ebdc8fb4ddaa171f.exe

  • Size

    5.1MB

  • MD5

    fc1a2295607f2b3bf46f685b6404a4af

  • SHA1

    ed10b08ff1d038bef137275baeecb9208043fc31

  • SHA256

    9296681b3bd964231c259027b9cbe07ae501f523689dfaf9ebdc8fb4ddaa171f

  • SHA512

    d09b1e062ae724a1a10e03a414b1a4ffbe78456d7f0fb7577bd698d80f66400ba8a19365937aa1d4e98b064e49cbb22e5296dec2d6afa6123f3f973a1cdfb9b7

  • SSDEEP

    98304:2Iyqv8Ik2wvNsihRArLDWz5qMUwdooiqpGgm8I:2Izul3RA3A5q0CKGg4

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9296681b3bd964231c259027b9cbe07ae501f523689dfaf9ebdc8fb4ddaa171f.exe
    "C:\Users\Admin\AppData\Local\Temp\9296681b3bd964231c259027b9cbe07ae501f523689dfaf9ebdc8fb4ddaa171f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1728
    • C:\Users\Admin\AppData\Local\Temp\update.exe
      C:\Users\Admin\AppData\Local\Temp\update.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    822467b728b7a66b081c91795373789a

    SHA1

    d8f2f02e1eef62485a9feffd59ce837511749865

    SHA256

    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

    SHA512

    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    92a457da06578ca5ef78265ccd499296

    SHA1

    67c83e086fe4cb681d5e08c6ab5997ef147dece4

    SHA256

    3b334614f7da1129f888b0f5cadcdd4c9d7e76350acd2af16a5064aa8d59867b

    SHA512

    1794eb783593c45967aa6a2b13335226e59e66e0a5e50279fa2b369b63757ab490d9885f803ea99c2c7cbdd2971c173e7520aacbce7b9657bc7fa2adffa0f66c

  • C:\Users\Admin\AppData\Local\Temp\CabB97F.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\update.ini

    Filesize

    229B

    MD5

    d37d878045f96bc4ebc3b7d23289728c

    SHA1

    071072dc21b2ca3d8df446caddf25afa378b80af

    SHA256

    da969e2272804c4df4f8d621939fc7a3be7268f2a95f9bed90b9154d845da382

    SHA512

    809d9b6763e4f71f61ca97875cfc94d8583a4634308e73a53a651ce3ee9176f4bb4dfe5b878e8a9f7da6e9b0bd9fa61f28b59fe01f7dee872936c24aa9779a93

  • \Users\Admin\AppData\Local\Temp\update.exe

    Filesize

    728KB

    MD5

    84dc2b9f77485d8544e9792dede4a2cf

    SHA1

    8d0171feb38f8c72247bf585e8d92875f506802a

    SHA256

    3d0acf42501dfa390dfc41ae38800ef2b22c9b2fac1644d08862a667cab37e5f

    SHA512

    37f17fa21bb10351adda743e60c617a94ad7402d5b41e8107d8139a47ac3465202868e57294f15ee07aafbcfdabfd71e14e9d859d7fdd072cba118a46ebc365d

  • memory/1728-536-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-540-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-510-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-512-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-514-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-516-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-518-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-520-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-522-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-524-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-526-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-528-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-530-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-532-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-534-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-0-0x0000000000400000-0x000000000091C000-memory.dmp

    Filesize

    5.1MB

  • memory/1728-538-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-508-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-542-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-544-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-546-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-548-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-550-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-562-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-560-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-558-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-556-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-554-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-552-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-2239-0x00000000023E0000-0x0000000002561000-memory.dmp

    Filesize

    1.5MB

  • memory/1728-564-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-504-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-7799-0x0000000000400000-0x000000000091C000-memory.dmp

    Filesize

    5.1MB

  • memory/1728-506-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-503-0x0000000002690000-0x00000000027A1000-memory.dmp

    Filesize

    1.1MB

  • memory/1728-1-0x0000000076290000-0x00000000762D7000-memory.dmp

    Filesize

    284KB