Analysis

  • max time kernel
    8s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/09/2024, 13:29

General

  • Target

    bd72f558aa6f09a22cb29da843205b7078e40daecf3f9cbc877424c885a8c0fdN.exe

  • Size

    1.1MB

  • MD5

    ef7a8b804550b897bbc498bad7aeaf40

  • SHA1

    987c2f090d09edc22eadfadff58241d97883a863

  • SHA256

    bd72f558aa6f09a22cb29da843205b7078e40daecf3f9cbc877424c885a8c0fd

  • SHA512

    e42c742762f8bc32ea7fa1e6fd22454ebeb0bb0e3b31cbbb8f2abe6f75fc13fac1facdcd76ecac6462fe1af287ce77cb5374b5a18d443b46f054b774c6dbe35f

  • SSDEEP

    12288:BwG9izpJ5n46SncBH7MTX0svLv/HbHt4SpcHGAB/Kc27P5HV0HiG+uLP6njiY25+:nMxIl

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • UPX packed file 21 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 35 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bd72f558aa6f09a22cb29da843205b7078e40daecf3f9cbc877424c885a8c0fdN.exe
    "C:\Users\Admin\AppData\Local\Temp\bd72f558aa6f09a22cb29da843205b7078e40daecf3f9cbc877424c885a8c0fdN.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1984
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\system32\svchost.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2876
    • C:\Users\Admin\AppData\Local\Temp\bd72f558aa6f09a22cb29da843205b7078e40daecf3f9cbc877424c885a8c0fdN.exe
      "C:\Users\Admin\AppData\Local\Temp\bd72f558aa6f09a22cb29da843205b7078e40daecf3f9cbc877424c885a8c0fdN.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\KPLMX.bat" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2024
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Svchost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MSSN\svchost.exe" /f
          4⤵
          • Adds Run key to start application
          • System Location Discovery: System Language Discovery
          PID:980
      • C:\Users\Admin\AppData\Roaming\MSSN\svchost.exe
        "C:\Users\Admin\AppData\Roaming\MSSN\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:532
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\system32\svchost.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:1780
        • C:\Users\Admin\AppData\Roaming\MSSN\svchost.exe
          "C:\Users\Admin\AppData\Roaming\MSSN\svchost.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          PID:2932
        • C:\Users\Admin\AppData\Roaming\MSSN\svchost.exe
          "C:\Users\Admin\AppData\Roaming\MSSN\svchost.exe"
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:848
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2488
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
              6⤵
              • Modifies registry key
              PID:2280
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\MSSN\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MSSN\svchost.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2272
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\MSSN\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\MSSN\svchost.exe:*:Enabled:Windows Messanger" /f
              6⤵
              • Modifies registry key
              PID:2340
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
              PID:2180
              • C:\Windows\SysWOW64\reg.exe
                REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
                6⤵
                • Modifies registry key
                PID:1716
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\NAOO.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\NAOO.exe:*:Enabled:Windows Messanger" /f
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2292
              • C:\Windows\SysWOW64\reg.exe
                REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\NAOO.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\NAOO.exe:*:Enabled:Windows Messanger" /f
                6⤵
                • Modifies registry key
                PID:2188

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\KPLMX.bat

            Filesize

            141B

            MD5

            eedf1bdeda7a9e6d314f346ae723cef1

            SHA1

            0680703a702f23e44ca855381c8764cfb7ec406e

            SHA256

            c8eed6be01e84beeef07e298e0db3a86e14d265f176034c1a1b6b386f3766920

            SHA512

            5d7081569bfea250054a49efea9d444ff7af9a351b959fec6197896622d9b0af4b32711c987493a088f2068834095e57ecd7856423b61fb5b950a7b704fdb364

          • \Users\Admin\AppData\Roaming\MSSN\svchost.exe

            Filesize

            1.1MB

            MD5

            9db64342fad92a23196d4a84fff0b984

            SHA1

            fe8f31708e5ae1ea666d05f48645066f63a33428

            SHA256

            4d6ea5db841ff2c75728bdc0a7a71ec439a4b538e40d8dd2dc437aa2ea8b35d8

            SHA512

            5b105bfac74c7d87813b55e9413e0d5ea489c7f2e4b766710189ef2e58143257aa18ce968de766eb8042d3822b35f31254423c6203015789a8f4f4bff5956bb9

          • memory/532-307-0x0000000000400000-0x0000000000521000-memory.dmp

            Filesize

            1.1MB

          • memory/848-312-0x0000000000400000-0x000000000047B000-memory.dmp

            Filesize

            492KB

          • memory/848-306-0x0000000000400000-0x000000000047B000-memory.dmp

            Filesize

            492KB

          • memory/1984-97-0x0000000000400000-0x0000000000521000-memory.dmp

            Filesize

            1.1MB

          • memory/1984-28-0x0000000000300000-0x0000000000301000-memory.dmp

            Filesize

            4KB

          • memory/1984-80-0x0000000000400000-0x0000000000521000-memory.dmp

            Filesize

            1.1MB

          • memory/1984-78-0x00000000003F0000-0x00000000003F2000-memory.dmp

            Filesize

            8KB

          • memory/1984-70-0x00000000003D0000-0x00000000003D1000-memory.dmp

            Filesize

            4KB

          • memory/1984-60-0x00000000003B0000-0x00000000003B1000-memory.dmp

            Filesize

            4KB

          • memory/1984-40-0x0000000000360000-0x0000000000361000-memory.dmp

            Filesize

            4KB

          • memory/1984-83-0x0000000000530000-0x0000000000531000-memory.dmp

            Filesize

            4KB

          • memory/1984-117-0x0000000000400000-0x0000000000521000-memory.dmp

            Filesize

            1.1MB

          • memory/1984-302-0x0000000000400000-0x0000000000521000-memory.dmp

            Filesize

            1.1MB

          • memory/1984-5-0x0000000000230000-0x0000000000231000-memory.dmp

            Filesize

            4KB

          • memory/1984-25-0x0000000000403000-0x0000000000404000-memory.dmp

            Filesize

            4KB

          • memory/1984-15-0x0000000000250000-0x0000000000251000-memory.dmp

            Filesize

            4KB

          • memory/1984-0-0x0000000000400000-0x0000000000521000-memory.dmp

            Filesize

            1.1MB

          • memory/1984-136-0x0000000000400000-0x0000000000521000-memory.dmp

            Filesize

            1.1MB

          • memory/1984-3-0x0000000000230000-0x0000000000231000-memory.dmp

            Filesize

            4KB

          • memory/2456-165-0x0000000003790000-0x00000000038B1000-memory.dmp

            Filesize

            1.1MB

          • memory/2456-140-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2456-304-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2456-310-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2456-135-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2456-134-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2456-133-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2456-132-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2456-130-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2456-128-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2456-126-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2456-178-0x0000000003790000-0x00000000038B1000-memory.dmp

            Filesize

            1.1MB

          • memory/2876-98-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/2876-100-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/2876-113-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/2876-104-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/2876-139-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/2876-106-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/2876-112-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/2876-303-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/2876-108-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2876-110-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/2932-305-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB

          • memory/2932-311-0x0000000000400000-0x000000000040B000-memory.dmp

            Filesize

            44KB