Analysis

  • max time kernel
    119s
  • max time network
    82s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    15-09-2024 05:06

General

  • Target

    97e27637b229515f0d2838401c8ea0a0N.exe

  • Size

    49KB

  • MD5

    97e27637b229515f0d2838401c8ea0a0

  • SHA1

    e389a79d77fc6341c9e6f9964f1336fa6cf4fac6

  • SHA256

    201e60be2b94e23d56f349b7bd01abaf99c04e07bc9168fb932a64f831520818

  • SHA512

    32aa372f54de1da5b48c937777c51d7ca9866b150bad378dc2b52825b3383f4cc597ea2ac8022abf42099a79b1f731ed2c093a74b182dd6d441adea8cfaa44ad

  • SSDEEP

    768:Q8eRHO9lFh0ul16sh7iQroCH/f+RjFBSuB2X8uw:Q9lOZ16sh7iQroCuRB0uZuw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97e27637b229515f0d2838401c8ea0a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\97e27637b229515f0d2838401c8ea0a0N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2972
    • C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe
      "C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      PID:2400

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\bkgrnd.exe

    Filesize

    49KB

    MD5

    f98a6ac964f655262598b686101d00f2

    SHA1

    9d4e33d7299047dca8d447de5c010919761e2c3f

    SHA256

    dfba6145b9acae1ace5e984cc282d60d7a0c8ac82e9b6b7e7ab2f3bcd93c1c3f

    SHA512

    8e9e42535471da56b89d0d85929096890fb1adfb1d91b11ed95f52b55cfe223437dc6014d5534ebad656d52069aa958d76ec67b60ff5f854a3ab6e85c9cbdb33

  • memory/2400-9-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2400-26-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2972-0-0x0000000000400000-0x000000000040A000-memory.dmp

    Filesize

    40KB

  • memory/2972-2-0x0000000004000000-0x0000000004006000-memory.dmp

    Filesize

    24KB

  • memory/2972-1-0x0000000004000000-0x0000000004006000-memory.dmp

    Filesize

    24KB