Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11/09/2024, 20:02

General

  • Target

    7cc25f68a5f2a8848e894bb41d8ac94f45706445ca4a1fb593eb965c1c4927c7.exe

  • Size

    4.5MB

  • MD5

    a0669811eeafc6e42fc05398172ca926

  • SHA1

    f9c92ca0763229a8439a676765cc3532028eda60

  • SHA256

    7cc25f68a5f2a8848e894bb41d8ac94f45706445ca4a1fb593eb965c1c4927c7

  • SHA512

    30e297f0832a37df2accada2a34b04c6c9f745937ad2d441fb53c56f54fba2a0a159ff228c2adb44c7f5b50014eb0526a1928d85b683d13147d4978194bd549d

  • SSDEEP

    98304:lFqjdqxkJu1Uo3vluv/+S79V96Ni0vDOqDSGgK04GadtP:lFqjYk8SU49go0vCqDXgKhHp

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7cc25f68a5f2a8848e894bb41d8ac94f45706445ca4a1fb593eb965c1c4927c7.exe
    "C:\Users\Admin\AppData\Local\Temp\7cc25f68a5f2a8848e894bb41d8ac94f45706445ca4a1fb593eb965c1c4927c7.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\TiMi Fastboot To EDL.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\TiMi Fastboot To EDL.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2364

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\TiMi Fastboot To EDL.exe

    Filesize

    4.9MB

    MD5

    37827de6933db29f4c794c13decc63f6

    SHA1

    20aa5a461d2e5739e1bece6256217873f35c9aec

    SHA256

    b72bdee83b1308921aeafe038e877c42b88f91048f26c0d01d7554d2284b6a65

    SHA512

    47e8fb7758717abdcc6a2cea3360d4ba5bf9ab38e484e4368f5cbb88dca43a9f0493b9c6036dc79c461fcd5e63465ea592227415fff4aa22acbdc8017556ca74

  • memory/2364-17-0x000000007403E000-0x000000007403F000-memory.dmp

    Filesize

    4KB

  • memory/2364-18-0x0000000004B80000-0x0000000004C97000-memory.dmp

    Filesize

    1.1MB

  • memory/2364-19-0x0000000004B80000-0x0000000004C97000-memory.dmp

    Filesize

    1.1MB

  • memory/2364-20-0x0000000004B80000-0x0000000004C97000-memory.dmp

    Filesize

    1.1MB

  • memory/2364-40-0x0000000010000000-0x0000000010005000-memory.dmp

    Filesize

    20KB

  • memory/2364-37-0x0000000010000000-0x0000000010005000-memory.dmp

    Filesize

    20KB

  • memory/2364-34-0x0000000010000000-0x0000000010005000-memory.dmp

    Filesize

    20KB

  • memory/2364-31-0x0000000010000000-0x0000000010005000-memory.dmp

    Filesize

    20KB

  • memory/2364-29-0x0000000010000000-0x0000000010005000-memory.dmp

    Filesize

    20KB

  • memory/2364-59-0x0000000007C30000-0x0000000007C3E000-memory.dmp

    Filesize

    56KB

  • memory/2364-46-0x0000000007C20000-0x0000000007C2E000-memory.dmp

    Filesize

    56KB

  • memory/2364-44-0x0000000007C20000-0x0000000007C2E000-memory.dmp

    Filesize

    56KB

  • memory/2364-90-0x0000000008140000-0x000000000814A000-memory.dmp

    Filesize

    40KB

  • memory/2364-77-0x0000000008130000-0x000000000813A000-memory.dmp

    Filesize

    40KB

  • memory/2364-80-0x0000000008130000-0x000000000813A000-memory.dmp

    Filesize

    40KB

  • memory/2364-75-0x0000000008130000-0x000000000813A000-memory.dmp

    Filesize

    40KB

  • memory/2364-98-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2364-105-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2364-109-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2364-110-0x0000000008E60000-0x0000000008E82000-memory.dmp

    Filesize

    136KB

  • memory/2364-121-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2364-122-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2364-123-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2364-124-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2364-125-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2364-126-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2364-127-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2364-128-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2364-129-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2364-130-0x0000000009490000-0x0000000009540000-memory.dmp

    Filesize

    704KB

  • memory/2364-131-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB

  • memory/2364-132-0x000000007403E000-0x000000007403F000-memory.dmp

    Filesize

    4KB

  • memory/2364-133-0x0000000074030000-0x000000007471E000-memory.dmp

    Filesize

    6.9MB