Analysis

  • max time kernel
    30s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 23:54

General

  • Target

    ffc97b0213c8a7c8fe8c37c40b7e45f67874a7c669d3875550d0c55db0215760.exe

  • Size

    96KB

  • MD5

    edf933253b981d8eed9b0a21867cfcb6

  • SHA1

    d304fd047dc65dc1bb14c8c01838c9544b28dc69

  • SHA256

    ffc97b0213c8a7c8fe8c37c40b7e45f67874a7c669d3875550d0c55db0215760

  • SHA512

    81ccc5e98142194a354873119369cbf6928093be91f9835d754bb3120a2b2588f7beb011a0ffa656f92e502b161d6bb0eb4c190e9fd0d2b2f507a3e9672bbc87

  • SSDEEP

    1536:gWQE6I4tGxys2y5KUhQVkzjtREZBpipNK3YTjkgzOM6bOLXi8PmCofGy:gxNYy2hQVszEoRzDrLXfzoey

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Drops file in System32 directory 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffc97b0213c8a7c8fe8c37c40b7e45f67874a7c669d3875550d0c55db0215760.exe
    "C:\Users\Admin\AppData\Local\Temp\ffc97b0213c8a7c8fe8c37c40b7e45f67874a7c669d3875550d0c55db0215760.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Loads dropped DLL
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1756
    • C:\Windows\SysWOW64\Bmenijcd.exe
      C:\Windows\system32\Bmenijcd.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1652 -s 140
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2000

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\SysWOW64\Bmenijcd.exe

    Filesize

    96KB

    MD5

    71fcc8e28cad1d5e01d79786428b323b

    SHA1

    38b63881746947b5df91e3130ceaa9e599901c09

    SHA256

    53a0020a4e3ba2a2ec7f23b1c8b85e40118ba8d6070ff9ec04584ece91a58df7

    SHA512

    26c5e65afeea98520e7c066aad60cfcd14cf6ed2d0e6d414041fe0f09b3193a4122f317723fdb45bd8008bf89b6e92b285ec4f104bbec3132cca6f2264e73580

  • memory/1652-14-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1756-0-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB

  • memory/1756-11-0x0000000000450000-0x0000000000491000-memory.dmp

    Filesize

    260KB

  • memory/1756-12-0x0000000000450000-0x0000000000491000-memory.dmp

    Filesize

    260KB

  • memory/1756-19-0x0000000000400000-0x0000000000441000-memory.dmp

    Filesize

    260KB