Resubmissions

20-09-2024 23:13

240920-27saxatcpa 8

20-09-2024 20:18

240920-y3p37swclc 8

Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-09-2024 20:18

General

  • Target

    783c4a9cf616f01dbad0fc49bb49d61bb6f9fb95c1bcafacb9529198fc0b77a2.exe

  • Size

    3.9MB

  • MD5

    88eac956a4fece558db3280a977b6742

  • SHA1

    e106164356d948d05b204a2e47e64a80000db61e

  • SHA256

    783c4a9cf616f01dbad0fc49bb49d61bb6f9fb95c1bcafacb9529198fc0b77a2

  • SHA512

    3f6f62053cbf9eccaf6157220a17a4354eb696200847e0c1c0904bc7aedeed1425e8d79829f8a6deb54c8220983d4cd198163aef83849cbec8c4b0166790aa18

  • SSDEEP

    98304:KCtlY3/JaXu7ouSnvOV05O9M57uRleMbGv:RjY3/JaXu7ouSnvOV05O9M57uRlerv

Malware Config

Signatures

  • Server Software Component: Terminal Services DLL 1 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\783c4a9cf616f01dbad0fc49bb49d61bb6f9fb95c1bcafacb9529198fc0b77a2.exe
    "C:\Users\Admin\AppData\Local\Temp\783c4a9cf616f01dbad0fc49bb49d61bb6f9fb95c1bcafacb9529198fc0b77a2.exe"
    1⤵
    • Server Software Component: Terminal Services DLL
    • Suspicious use of WriteProcessMemory
    PID:2224
    • C:\Windows\system32\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\xnyxrp.bat
      2⤵
      • Deletes itself
      PID:2228
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k "nvdrvsvc"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2376
    • C:\Users\Admin\Appdata\Roaming\nVidia\AppData\App\drive.exe
      C:\Users\Admin\Appdata\Roaming\nVidia\AppData\App\drive.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      PID:2744

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\xnyxrp.bat

    Filesize

    248B

    MD5

    b6849e0440ad49764a90ba27e49acb6e

    SHA1

    f38e867744611e505a37ffba8d1258b652fd1723

    SHA256

    276c468065e7a6d7ee8d8a8191d986a8d923f9b46df6255681a9e6ffd5699172

    SHA512

    401399bc980e51c8a86e29da5807ec9a079f20fa3934109a9e6e2d82814767718abb90d770fd4faa80215c92623f590f7a3c133db832c2787c281a91ee1644af

  • C:\Users\Admin\AppData\Roaming\nVidia\AppData\App\drive.exe

    Filesize

    362KB

    MD5

    fd3896c897f5597bd1a21c82f6059730

    SHA1

    55fe78944c442627957c3230db31219b8249f0fd

    SHA256

    d77d66801f74ec7981d4215bdd7fa0743bee731bf30ce4b4f85be45f6feccd40

    SHA512

    e833babbf4d00eed5f38c24bb20a7645bc1d630a1602a034f398960f101558153af8145a10abec53e5e70168b65ba2fc60363036cbc9992dff7ec89ef43f90e5

  • memory/2224-9-0x0000000000400000-0x00000000005E4000-memory.dmp

    Filesize

    1.9MB

  • memory/2376-11-0x00000000008A0000-0x0000000000A7D000-memory.dmp

    Filesize

    1.9MB

  • memory/2376-19-0x00000000008A0000-0x0000000000A7D000-memory.dmp

    Filesize

    1.9MB

  • memory/2744-20-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB

  • memory/2744-32-0x0000000000400000-0x0000000000461000-memory.dmp

    Filesize

    388KB