Analysis

  • max time kernel
    68s
  • max time network
    69s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19-09-2024 09:51

General

  • Target

    MacroRecorderSetup.exe

  • Size

    2.6MB

  • MD5

    50307092df1de5735811933cefad0b85

  • SHA1

    fcf6d604a542d6aebee2e6828966387367b04cbf

  • SHA256

    864d70dd755dab8431c2465531067cf8130166585e55dd4c4bb7de3df54a1967

  • SHA512

    0cf5ece8b4ab2e302136f9bf65c89f6d4d79f5cad7989250b04ffb6c110009db081fc817b653c0bfdd54c6da8e7c1b6cafc0ed157ba72cef9ddd863f3f12dd90

  • SSDEEP

    49152:Aqe3f6QX7FIsEl4404EcVZvUWN6NuFXL+fLLMtj7yWRBywyYkHeBnI:VSijsEl904EcVuWN6yMLAtj2sEwlpVI

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 23 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 40 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MacroRecorderSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\MacroRecorderSetup.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\is-CSTAO.tmp\MacroRecorderSetup.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-CSTAO.tmp\MacroRecorderSetup.tmp" /SL5="$E0152,1902330,780800,C:\Users\Admin\AppData\Local\Temp\MacroRecorderSetup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Program Files (x86)\MacroRecorder\MacroRecorder.exe
        "C:\Program Files (x86)\MacroRecorder\MacroRecorder.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        PID:672

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files (x86)\MacroRecorder\MacroLauncher.exe

    Filesize

    470KB

    MD5

    9d024bbd0b1dba4baed68783d74ec47b

    SHA1

    6034648bdff3ee98bd1b8273124caad67067500b

    SHA256

    8a0f56a70cb58e004d9a8c158aba2a665e66dc83f0664a6f27445c9687af2442

    SHA512

    03ab2470fdb9dde9cac4a80016dc6e1387be6d2ff774cb06911b4ba6c4e54b492fb7dd48dbe0e190dd84c4cb1eaae3bf4ab3003a0d0b71a195122f31d8517ea1

  • \Program Files (x86)\MacroRecorder\MacroRecorder.exe

    Filesize

    1.1MB

    MD5

    cd2ff16f2aa3a0525c7e9ed355ba7457

    SHA1

    0511be4d649c8da29ac8af12f019a8ca01f00ade

    SHA256

    9e2b3c898821eabc315576f6f274dbdd4e055c60ef3d2325a96caf702fd86ece

    SHA512

    45dc33d6790c66ad5bad9e6f3d0b0f47ef4b112ed6e55601900f25aa46c171d6ad47a69f4a18e24afff218aab221de21e50d39c8823371e2bd5fae6019ca3299

  • \Users\Admin\AppData\Local\Temp\is-CSTAO.tmp\MacroRecorderSetup.tmp

    Filesize

    2.9MB

    MD5

    5f60fcd65065f14167a21d790ec39d05

    SHA1

    7930a70c8f96b743fd5a2a3923a6ea99280e53e0

    SHA256

    0b3a2cfecc43852e4999f817af79722ac0a18b3aaa749d40fa173bcc803fe2a8

    SHA512

    74b8edd32f3bb40a21cd1ab7c106f330d80318fc61153e4fed01200e2733e79310028b2fe3ebd83b7fc3392bcaba8ccd4aa990ab3ad571fbf779c5be5ff2e463

  • memory/672-69-0x00000000053F0000-0x00000000053F2000-memory.dmp

    Filesize

    8KB

  • memory/672-63-0x0000000000030000-0x0000000000150000-memory.dmp

    Filesize

    1.1MB

  • memory/2060-9-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2060-12-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2060-11-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2060-67-0x0000000000400000-0x00000000006EE000-memory.dmp

    Filesize

    2.9MB

  • memory/2148-10-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/2148-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/2148-68-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB

  • memory/2148-0-0x0000000000400000-0x00000000004CC000-memory.dmp

    Filesize

    816KB