Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-09-2024 19:35

General

  • Target

    529196d72869de8b9dde0bc0f01ccdd0N.exe

  • Size

    1.6MB

  • MD5

    529196d72869de8b9dde0bc0f01ccdd0

  • SHA1

    487bb2222a1b19158a4a0c2c08377fabc1109698

  • SHA256

    7201a384c7c2a11fe09269e42354b6f2bb56b8e188e8c328b14bccdd7e63a282

  • SHA512

    620154c26d674a16df020cfd390d54d35a5045b0f823e76f321e8a569f021ef467142b35bd08835a927e6934e7dea5bbf9704f34f331c7089251df63a4bbb223

  • SSDEEP

    12288:25cqQQdZ0U02cPh+bszyzBc17NFuruQ+rNxicoeYrvZCHVnyVggrSDT5kC8IHDtq:25cAN02cPhBjdZjHhQ6giafmvJW5

Score
4/10

Malware Config

Signatures

  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\529196d72869de8b9dde0bc0f01ccdd0N.exe
    "C:\Users\Admin\AppData\Local\Temp\529196d72869de8b9dde0bc0f01ccdd0N.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1152

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\inf\oem0.PNF

    Filesize

    6KB

    MD5

    d082aa128d0900e1433c2230318b692f

    SHA1

    b67c08ba627d5563f6d20f340c8d96b38097f8eb

    SHA256

    d8b718501de1f8e49c5cd002cf8ab28a0eae5e19df215fa23641a9b416e68b98

    SHA512

    0288123d00235b7cd396fcbb88d4c5faab14e52d4f41bd1a75924b43dfa9c13538294e697c7e9652cb6839bc7b6c321d2006aa598985668c116c48b3eee5e3e6

  • C:\Windows\inf\oem1.PNF

    Filesize

    6KB

    MD5

    767f3a8f3ee82158cf4c7a259f38d2f8

    SHA1

    38b715a2ea39e3b11cfa46ef04fefa9b7241d839

    SHA256

    5a422b69d9f53ee40a4e686f89dce208ab434f60dfe63984f5033bc8c3b32396

    SHA512

    cf7c31d0d7ec3e0325ee499e8df50d495edb5203725a4469afa781bb473a3e9c6f36165009eb729952477392c0e6b1c59fdb9312f2f605b3f7ca633394d16df8

  • memory/1152-0-0x0000000140000000-0x000000014023E000-memory.dmp

    Filesize

    2.2MB

  • memory/1152-7-0x0000000140000000-0x000000014023E000-memory.dmp

    Filesize

    2.2MB