Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    13-09-2024 20:09

General

  • Target

    pivot_v5-2.exe

  • Size

    662KB

  • MD5

    2c60a6deba7dbae94f76d94bd81a8dd7

  • SHA1

    759c0d563cc7051627409715e8081f7e00d940a8

  • SHA256

    1952334b617bcfa62aef1bc4f7640674986cb6cd021c29f43e0a85912775b81a

  • SHA512

    e3165a1fe4af119b621c457e770be313394d7201c755b3be6622871db5da76444b5792eac4c3f24bdae0e62b39ea89cb8322869c0dcb2674485ad6efea05bff1

  • SSDEEP

    12288:TymCz84Lnka4eec2ZZEhl3qgi4Bfig3bBiFPYp:TIz84Lnk5LEhl3qZ7pBYp

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Checks for any installed AV software in registry 1 TTPs 7 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 53 IoCs
  • Modifies system certificate store 2 TTPs 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pivot_v5-2.exe
    "C:\Users\Admin\AppData\Local\Temp\pivot_v5-2.exe"
    1⤵
    • Checks for any installed AV software in registry
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1232
  • C:\Users\Admin\AppData\Local\Temp\Pivot_Animator_files\pivotsetup.exe
    "C:\Users\Admin\AppData\Local\Temp\Pivot_Animator_files\pivotsetup.exe" /VERYSILENT
    1⤵
    • Executes dropped EXE
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1144
    • C:\Users\Admin\AppData\Local\Temp\is-7B7I7.tmp\pivotsetup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-7B7I7.tmp\pivotsetup.tmp" /SL5="$30210,18433013,58368,C:\Users\Admin\AppData\Local\Temp\Pivot_Animator_files\pivotsetup.exe" /VERYSILENT
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\system32\regsvr32.exe" /s "C:\Program Files (x86)\Pivot Animator v5\STKPreview.dll"
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2320

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ce82b89c326cdf24a9ce117869377018

    SHA1

    bb16880be41d9c049bb1f76bd272167513ccef1c

    SHA256

    62539a18b8298ec8d2eb150b08d7c077a7b283029200a01afd9970bea113bf4f

    SHA512

    0de161ebf3f8b2e1578c698a773b3c71a7daf227fd5014f7528d4d48d9565918d4af97f9f0a07d61451c70a58662814a698d006b24b4d0676a43a38cb8110d8b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ff357af3611f1ccee1b0ff7aa916a6ed

    SHA1

    4fd7e86462c7cf46a2e71e6bb3f7ac8c7771bdca

    SHA256

    a8b92ff1d6660622b177ec74e596a1f20d1267576f611fe61dfce32073a4d7c4

    SHA512

    3e4f381859516505f2c35b9bd574dc77fd7b2c6fc5780e63ccee3877a59dc00c2a11c98f3471b4323ec832f101c06659fdf363db39451a42fe712b922ad6d6e4

  • C:\Users\Admin\AppData\Local\Temp\Cab717A.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Pivot_Animator_files\pivotsetup.exe

    Filesize

    17.8MB

    MD5

    a52c104395773710fab7f6264aced388

    SHA1

    87bf5c40fbac501bc272cb5343e7ae09b13bfdb1

    SHA256

    2852267832c4338f9ab2488add87c71be9e9b6fac50f3395915e7b9b6ab5cd11

    SHA512

    47eb7a1bd1c78961a8ab5a90896df6be0d57e253798033ba6caafaef6826414a08f6f8fe085faee7601d06acc00bec26c8c9e8da0da97168370e69fa27cf829f

  • C:\Users\Admin\AppData\Local\Temp\Tar71AC.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Program Files (x86)\Pivot Animator v5\STKPreview.dll

    Filesize

    2.5MB

    MD5

    2c639820b502df57891e7c4ee805f4b7

    SHA1

    d90ecab78c86152c31f6963096107fbb115f7bae

    SHA256

    dcdaf630b7a42bb9d6b1693e159175d68569f20f3ab034af4124d3c775436458

    SHA512

    afd96af844d30256e9fe1983e82317ace56d6741bf3f2647fee6ef6870b610a4b71560aca95a62ed5b54a2e1ab0ef1487a536124328f4ac327a0b86b1c1900a4

  • \Program Files (x86)\Pivot Animator v5\pivot.exe

    Filesize

    13.1MB

    MD5

    ab3c884e603de1d2d9d4bb9edeac8762

    SHA1

    123e87c326a39d641571c5f5d54e9b1f42926cc3

    SHA256

    af38da271a7fb34617b094b3832af8f016168d0923dabbfb297633fb22e49036

    SHA512

    ecf3474372d1af6f4e93fe655b188b03744f07166fe2ae3947650fec8afabd2bb721270d8e3ef97d52cd4071e6a94ca1c1f5ecf304ed0711bb932bfce133982f

  • \Program Files (x86)\Pivot Animator v5\unins000.exe

    Filesize

    713KB

    MD5

    6341d7c8365a68edfa370476a6de9262

    SHA1

    08ca9e3631bc815b7c3afd4fe461385f4667710d

    SHA256

    5cc26edaa9445ff84e9d118245f07e4ff740ca72788a7b8d2c32d52d68f36afb

    SHA512

    51ab8057a974fa227084756311d5fe8d3e9bb6d5ac785d405a3f9914a0066adb5cd753a0e844109ccf711c2b34ccfa001f2ab3b05587848519ec5b74f71861eb

  • \Users\Admin\AppData\Local\Temp\is-7B7I7.tmp\pivotsetup.tmp

    Filesize

    702KB

    MD5

    1afbd25db5c9a90fe05309f7c4fbcf09

    SHA1

    baf330b5c249ca925b4ea19a52fe8b2c27e547fa

    SHA256

    3bb0ee5569fe5453c6b3fa25aa517b925d4f8d1f7ba3475e58fa09c46290658c

    SHA512

    3a448f06862c6d163fd58b68b836d866ae513e04a69774abf5a0c5b7df74f5b9ee37240083760185618c5068bf93e7fd812e76b3e530639111fb1d74f4d28419

  • memory/1144-427-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1144-241-0x0000000000401000-0x000000000040C000-memory.dmp

    Filesize

    44KB

  • memory/1144-239-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/1232-9-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-0-0x000007FEF51E3000-0x000007FEF51E4000-memory.dmp

    Filesize

    4KB

  • memory/1232-13-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-16-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-15-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-17-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-18-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-19-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-20-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-21-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-12-0x000007FEF51E3000-0x000007FEF51E4000-memory.dmp

    Filesize

    4KB

  • memory/1232-11-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-10-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-14-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-237-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-8-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-7-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-6-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-5-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-428-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-4-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/1232-1-0x0000000000920000-0x00000000009C8000-memory.dmp

    Filesize

    672KB

  • memory/1232-3-0x000000001A760000-0x000000001A77A000-memory.dmp

    Filesize

    104KB

  • memory/1232-2-0x000007FEF51E0000-0x000007FEF5BCC000-memory.dmp

    Filesize

    9.9MB

  • memory/2300-426-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2300-247-0x0000000000400000-0x00000000004BF000-memory.dmp

    Filesize

    764KB

  • memory/2320-422-0x0000000002290000-0x000000000251C000-memory.dmp

    Filesize

    2.5MB