Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 11:02

General

  • Target

    a2565f04d58f58bc8ca5a960408f7db0N.exe

  • Size

    78KB

  • MD5

    a2565f04d58f58bc8ca5a960408f7db0

  • SHA1

    4e73bcd7a6cff378986904b0f0e1857580308ac0

  • SHA256

    cb1624fb8d4ff67a6c9402fb29693ffaeda4059d8a1ce65ed61aa76a10cc69af

  • SHA512

    1eb54cbe7dfb366ec0ff0874cbc720ce80609ace1e8ae2206ad4acd70ae261159961a6b59982e38a802bbaf1dce1eeae6f2a21eee3e2ce6bcd2537f513b5c2a9

  • SSDEEP

    1536:QPCHFo6638dy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtl9/+1Jg:QPCHFo53Ln7N041Qqhgl9/l

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2565f04d58f58bc8ca5a960408f7db0N.exe
    "C:\Users\Admin\AppData\Local\Temp\a2565f04d58f58bc8ca5a960408f7db0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ths2mz-g.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES42BC.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc42BB.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2716
    • C:\Users\Admin\AppData\Local\Temp\tmp402C.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp402C.tmp.exe" C:\Users\Admin\AppData\Local\Temp\a2565f04d58f58bc8ca5a960408f7db0N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES42BC.tmp

    Filesize

    1KB

    MD5

    b981e0934c9b730de2d06ba3964b77ca

    SHA1

    58837ead46dd79ab98193f2c604895cee4abf846

    SHA256

    a40b31e8887bb9ef83198f0f72121393faee4ee9a57d97bdb6cd2cd51fdcb29b

    SHA512

    e78d7975a1caa638d569fe2f6e97ed22d4ce5925fa5fbba638bcf300338dbcaa173f63809dff67c45db0c69ae301172388c2a252bd517076b04334a24df445c9

  • C:\Users\Admin\AppData\Local\Temp\ths2mz-g.0.vb

    Filesize

    15KB

    MD5

    11da683a0dd18adf2a68f135f5c54eef

    SHA1

    40a14a1521d276bf5ee5d7d23e90a9ca7ca76da2

    SHA256

    a6f53f07197bdb86ee8d9976639d40486418368b579a58bbb1cbac18d8ea071c

    SHA512

    c288e6668b3988a838708d272c6e1c3b3e2eb9f1cbffbd35537e8bcbd042ffe4f3957ca6cce8006c1a11cc10805f7893e8e7009d48dd6928c96eddcaa457bd61

  • C:\Users\Admin\AppData\Local\Temp\ths2mz-g.cmdline

    Filesize

    266B

    MD5

    1fe4e5a165636c497a65919ef729de3d

    SHA1

    52918c5eb000dd50f688172c4dab9c16217b3be3

    SHA256

    cac54134a2ef6dd29323aa604b96d488861b413bc33c1ff0d2f17d47ba7a199e

    SHA512

    be48b65dff62170a8a9a55a9de1686a12d037e0432153f96e6d1e7856091ebfe7a6cff64fe8fa5a5eed25c017d480c8f70f2d024c4a8a1380983de79a152be3c

  • C:\Users\Admin\AppData\Local\Temp\tmp402C.tmp.exe

    Filesize

    78KB

    MD5

    8e0be63f7b829942746bf6a9028e761e

    SHA1

    29043a6bfd0caab6d46dc7c94631e9ac13c17a45

    SHA256

    9bc63a8cdd32b4e29390236fd7491b1f6ea3ac5ee74820d8faf1f97225d7ad7a

    SHA512

    a4e91013973dd7e855234c8017ad4e88530d17004484aa4a3d207b3cc224b9ccfc5fab75ca3f79c3532cf292e0f3d309d3e6fd658393ab277c6f7ea79dedccb5

  • C:\Users\Admin\AppData\Local\Temp\vbc42BB.tmp

    Filesize

    660B

    MD5

    2019116d49f262c103c890e2c7420a1a

    SHA1

    98870df0b8daf0e621bb653372145445e625d894

    SHA256

    196bb36e515a0896ddd5eec0750968d84a0bd32c9be733d43d66ad46b3058496

    SHA512

    45d2ae482e6d01e04ba671c6d43f541b8171f8873cf57dbb33800cf894a38fe1eca627eee91159f95fa2ebaba8724dc3b045d6621838dd68d7601ee57ec1fe0a

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    aa4bdac8c4e0538ec2bb4b7574c94192

    SHA1

    ef76d834232b67b27ebd75708922adea97aeacce

    SHA256

    d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

    SHA512

    0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

  • memory/2108-0-0x0000000074341000-0x0000000074342000-memory.dmp

    Filesize

    4KB

  • memory/2108-1-0x0000000074340000-0x00000000748EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2108-2-0x0000000074340000-0x00000000748EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2108-24-0x0000000074340000-0x00000000748EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2772-8-0x0000000074340000-0x00000000748EB000-memory.dmp

    Filesize

    5.7MB

  • memory/2772-18-0x0000000074340000-0x00000000748EB000-memory.dmp

    Filesize

    5.7MB