Analysis

  • max time kernel
    117s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    13-09-2024 20:46

General

  • Target

    ef57a4d074b6e37051ce9317cc2d06f0N.exe

  • Size

    82KB

  • MD5

    ef57a4d074b6e37051ce9317cc2d06f0

  • SHA1

    d0a9697d4f48c0387b5e73d1d3bf3400a88d172f

  • SHA256

    1bdf993e05d10e0e18dbacda4135f247600802acd2800fc712f179146660584b

  • SHA512

    86b3654e3c63d647e81d05f335b18185826b02dd5a4b3a00cf60b1a56f3c58a38b957c419137d86c414b05477485f6dcc4d191656692755c0b7b35c68780d4e3

  • SSDEEP

    768:rZVy+DZ4mV+RMO2rhgFwuqCbxTGy/BBGg4NKhLU4dhbDW2+Kv00dX0vN0TlT+Xy5:Bamlu3hbBGy3G8nhMpHKvw816C

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 34 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 36 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef57a4d074b6e37051ce9317cc2d06f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\ef57a4d074b6e37051ce9317cc2d06f0N.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2204
    • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\vcw.exe
      "c:\Documents and Settings\Admin\Application Data\Microsoft\vcw.exe" ef57a4d074b6e37051ce9317cc2d06f0N
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:1664

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\vcw.exe

    Filesize

    82KB

    MD5

    54221861a485666acdc1f50abc7695c6

    SHA1

    256f7c6f8a0bc717c84b683dfd57887c602ea049

    SHA256

    f8c83464071770b4253f42a3a9adadc26eb60162b2f95fa74fcf698f8cfdf4c9

    SHA512

    ab7399353f181411c23ea71d844ebb9e789e6d26ec88dcecc95c911ac738b01f1c842a6f0a7ff225aabbbf754d0fcf27a27430cfd95209765390017b624c5e9e

  • \??\c:\windows\SysWOW64\Windows 3D.scr

    Filesize

    82KB

    MD5

    fa796eb44a6a4a4d0dde400abc6610a9

    SHA1

    3468b25f951537a147d00590a2829b0e6eb86d97

    SHA256

    341cf0740f3dc0ccd6ab647631b7ea0e9263db5f086113e7fdbfdb4549b9d553

    SHA512

    578ae0cbda320183e0aa207af1ae24349eb85a8dda3a698fee76903cba1c5b77e4d1f5a1a1eefd968f864ec0fc43a9ef2a12996bb2808b629c505fb3ca9ee3f0

  • \??\c:\windows\SysWOW64\maxtrox.txt

    Filesize

    8B

    MD5

    24865ca220aa1936cbac0a57685217c5

    SHA1

    37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

    SHA256

    841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

    SHA512

    c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062