Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/09/2024, 05:36

General

  • Target

    e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe

  • Size

    78KB

  • MD5

    e9aa1ee59fa0c9fd23e6b53ef8d75d10

  • SHA1

    88c95c7154b7b4b331d1930eecab7fa775459105

  • SHA256

    9a2d2ef95e3c6fa28689fdc27c1689954342bfbc07fcf7ee1310a2873ad52ad1

  • SHA512

    bcf33e3d2d205660ccf2b6be75366f6398e4c52a7aae8de7b375badb9eaec69c82b1f6d19ed429f07a0fda09787fe5a117331420eee16491e533cbf54cd12917

  • SSDEEP

    1536:CyV5jSWAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qtd6G9/l1r4:VV5jSWAtWDDILJLovbicqOq3o+n99/U

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe
    "C:\Users\Admin\AppData\Local\Temp\e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\z6e60afi.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES407.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc406.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2836
    • C:\Users\Admin\AppData\Local\Temp\tmp2FD.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp2FD.tmp.exe" C:\Users\Admin\AppData\Local\Temp\e9aa1ee59fa0c9fd23e6b53ef8d75d10N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2896

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES407.tmp

    Filesize

    1KB

    MD5

    bc8def97a22488e19c4b01c1d2c81180

    SHA1

    1d59ee3094cd5b1628c25100fabb4703b615b86e

    SHA256

    ccfd6716ca906f6dca5ada9689e43382ada735eab4b278d6a94df978ad74aa84

    SHA512

    f600dbc51a771e58fa5b240cb0b52816500d2b608a2d9df5a58e320a778b1a6169bdccb547ce812150502b61751213744037e201d8007076000504e494ce211d

  • C:\Users\Admin\AppData\Local\Temp\tmp2FD.tmp.exe

    Filesize

    78KB

    MD5

    91026473efa50b4d1af03da2d3c32ada

    SHA1

    52be3a2c734f76f83634d53105c1ecc6dc3ffb3f

    SHA256

    7610854ff64ffb40b6601111ba033150166ef3fc9809f00a9791394ea27a1208

    SHA512

    65e391545922e027af9aa6126ff3abfe036c2e6dadddb35a5e2d55d7bfa01dd459cac08cd187a5bd0e9f68b419ba80c9a68f586c6f0215ade6066df106964f41

  • C:\Users\Admin\AppData\Local\Temp\vbc406.tmp

    Filesize

    660B

    MD5

    8a39398d65c6ac165506dec0d29ee560

    SHA1

    6d20b3c2931d73340444f7a99cd93bc1a177e828

    SHA256

    fd178081e4286c8cc442291ca5ace300e881acf73820244924d50cd135879dbb

    SHA512

    73e528c7f59633974e7504798cb615d149cf8a45b6ddaa789a966128b4e8f4740f56e11e8b307fc0adf0e9e603f2d1494bb70dbf7b5a36ef43217aa916138217

  • C:\Users\Admin\AppData\Local\Temp\z6e60afi.0.vb

    Filesize

    14KB

    MD5

    05c5c18613bc05a39aa1d536496fe03a

    SHA1

    8a40167d5d28d40a292cf65b763336bc04cc2ef5

    SHA256

    731855d6af1881c1ccfc0e29fe8cecb442fd75227347196d081b5396f31e44f9

    SHA512

    84a28f1e179756fbff25f4fbdb13045c94acefeee886ff725e6ad4bdc0ebbe64b9a3c589140c83d76c2d02d0f9ceb296dd59244189277b57d2e1dcfab0b3218e

  • C:\Users\Admin\AppData\Local\Temp\z6e60afi.cmdline

    Filesize

    265B

    MD5

    6c211852c05afd95ba6fa4425bf65ddc

    SHA1

    f052624c6995d482700925b13f1a901cb4e1bde2

    SHA256

    e2bd34bf82a9522d912c1388d23861233dfa10d9567998b9336ffbb6b9a33726

    SHA512

    635f01f619f600b944be23c9223237cbf5e6da07c5f7af6ec6ce7b2f4fbdcf291719141ebe6e96afbcd4c46e8eab82f4046dcb92dbe93c14be2b386684afe77f

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    a26b0f78faa3881bb6307a944b096e91

    SHA1

    42b01830723bf07d14f3086fa83c4f74f5649368

    SHA256

    b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5

    SHA512

    a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c

  • memory/1444-0-0x00000000744A1000-0x00000000744A2000-memory.dmp

    Filesize

    4KB

  • memory/1444-1-0x00000000744A0000-0x0000000074A4B000-memory.dmp

    Filesize

    5.7MB

  • memory/1444-2-0x00000000744A0000-0x0000000074A4B000-memory.dmp

    Filesize

    5.7MB

  • memory/1444-24-0x00000000744A0000-0x0000000074A4B000-memory.dmp

    Filesize

    5.7MB

  • memory/2424-8-0x00000000744A0000-0x0000000074A4B000-memory.dmp

    Filesize

    5.7MB

  • memory/2424-18-0x00000000744A0000-0x0000000074A4B000-memory.dmp

    Filesize

    5.7MB