Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 02:25

General

  • Target

    60e6412fdb3579181ab9b9473e25e53d58008f45476b0536c04b52a940238b7fN.exe

  • Size

    320KB

  • MD5

    f178f33904604e817be3d4504a8a8530

  • SHA1

    2a55516125be7ee608bd40f91eea1a2524c35366

  • SHA256

    60e6412fdb3579181ab9b9473e25e53d58008f45476b0536c04b52a940238b7f

  • SHA512

    f09c652ec9346079a3b8e3e92df82028676a987bd849f5d9e1cb560aaef9cb1c769d707879e561f70720151aa878a90de7d2b639d34b75074a2bb1978cec0107

  • SSDEEP

    6144:FXkmZOBRtoITkA53pK122OWXHCmHZW50l7F9R6ew+5:hOBRtMcow2OWXH5HZW5qHRX5

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\60e6412fdb3579181ab9b9473e25e53d58008f45476b0536c04b52a940238b7fN.exe
    "C:\Users\Admin\AppData\Local\Temp\60e6412fdb3579181ab9b9473e25e53d58008f45476b0536c04b52a940238b7fN.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2808
    • C:\Users\Admin\viuaxaf.exe
      "C:\Users\Admin\viuaxaf.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\viuaxaf.exe

    Filesize

    320KB

    MD5

    7721f4293dc964141e0506495231daa7

    SHA1

    cf9052dedb26a26c7f56cda9977c32f2197d10c4

    SHA256

    0ee80b5eff42be467954eb35f8fe5aa0b1584a851846bbc98807b92095bb2346

    SHA512

    bc6c7f711e4d2da6e5a04d957e3a150ae8b9d25f364a562171efcb716b3deb8d9ccc778f0de99eb97f0c113f46b3a19ea0e95d7ad1da71d1197c0fd93235e2ef

  • memory/2616-16-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2616-22-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2808-0-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2808-14-0x0000000002F10000-0x0000000002F63000-memory.dmp

    Filesize

    332KB

  • memory/2808-13-0x0000000002F10000-0x0000000002F63000-memory.dmp

    Filesize

    332KB

  • memory/2808-20-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/2808-21-0x0000000002F10000-0x0000000002F63000-memory.dmp

    Filesize

    332KB