Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/09/2024, 07:30

General

  • Target

    9d06b11ec4baa8004d9259e08bbd6470N.exe

  • Size

    884KB

  • MD5

    9d06b11ec4baa8004d9259e08bbd6470

  • SHA1

    513904d42f17558642a90ad6e4158f33834dfdc8

  • SHA256

    4aeb2549db11cf0d3bc89eb2cb7d40a9e1269dd71a2d3711054fba5ecb2b7411

  • SHA512

    62723fc40248242cad528af98cb08e1ed5ed124cf4fdad2e9932b34bd064f7542fe21e45d5d431eb272b6f5ff0e7b6e06b14601e10d4aaba53998940bff9745d

  • SSDEEP

    12288:s8kxNhOZElO5kkWjhD4A45lGUN8kxNhOZElO5kkWjhD4A45lGU:DqEkfFmkUeqEkfFmkU

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 34 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 38 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9d06b11ec4baa8004d9259e08bbd6470N.exe
    "C:\Users\Admin\AppData\Local\Temp\9d06b11ec4baa8004d9259e08bbd6470N.exe"
    1⤵
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1068
    • F:\$RECYCLE.BIN\EYJXNZA.EXE
      F:\$RECYCLE.BIN\EYJXNZA.EXE
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:1616

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\MKMHW.EXE

          Filesize

          885KB

          MD5

          a11a8c4e3992b051f3d65d56bb3993c3

          SHA1

          ef17f2e716f5692a05e041489722f455b478050a

          SHA256

          184b5156711ba2683114c19b694aa5aeaa97cf7d884191cbca4bd545bc0c1815

          SHA512

          72a19abf1c006d16bc60ee4609c97e65b58d07b3f559b421ebd0d7671dc3e64921db029072a715a73f3f1650dcc7935270fa0e2c1dde6c03f3066e0caa95d3c9

        • F:\$RECYCLE.BIN\EYJXNZA.EXE

          Filesize

          885KB

          MD5

          3ed8885e9e060aabe7cb0aadac4d56e1

          SHA1

          c55f4dcaaef1f395646b20aa3a5e10b6b5932cfa

          SHA256

          645dcb2ea91b569ef4883d8e767bff0d6624bfc9fc789b01ee804d7bf5e0f3cf

          SHA512

          319f37631c4ab51b11b4dec6c7b30ddc4d220f8eee680a7c25a8326a590e8873d0a6a343a77fa127ce6ce7d0e91e6654420de4629d03f6edf4163f17cb57b31e

        • memory/1068-0-0x0000000000630000-0x0000000000631000-memory.dmp

          Filesize

          4KB

        • memory/1068-24-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB

        • memory/1616-22-0x0000000000720000-0x0000000000721000-memory.dmp

          Filesize

          4KB

        • memory/1616-23-0x0000000000400000-0x000000000046B000-memory.dmp

          Filesize

          428KB