Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2024, 20:51

General

  • Target

    setup.exe

  • Size

    288KB

  • MD5

    69d97fdcbb8f5977f1db480f8955d72d

  • SHA1

    c8c343384dfb1558a24d84d0edc0e92fc030577c

  • SHA256

    73762b97fd006d8dc92609e1706485c61411edd6c0f97d04aa72438930b2a141

  • SHA512

    816a10b486d21cd3d12028c2f775e33e139964bade7a494164aa1b8fd052a81842ce0f0b2f26a5f1d372ed7a5d58957ca7a66c3bd40d02dcb966c60bf33710f3

  • SSDEEP

    6144:FFJ0PqSE16vzeEdhxK9nf5LMuRA/TuX3LzY1cagPNdxL97:wqSE167/w9nBgLSX4VgPNx

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\setup.exe
    "C:\Users\Admin\AppData\Local\Temp\setup.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2396
    • C:\Users\Admin\AppData\Local\Temp\begcabjfeh.exe
      C:\Users\Admin\AppData\Local\Temp\begcabjfeh.exe 0#2#7#5#6#9#9#0#8#5#0 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
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2268
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727470276.txt bios get serialnumber
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2092
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727470276.txt bios get version
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2168
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727470276.txt bios get version
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2112
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727470276.txt bios get version
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2820
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic /output:C:\Users\Admin\AppData\Local\Temp\81727470276.txt bios get version
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2592
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2268 -s 368
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2756

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\81727470276.txt

    Filesize

    66B

    MD5

    9025468f85256136f923096b01375964

    SHA1

    7fcd174999661594fa5f88890ffb195e9858cc52

    SHA256

    d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

    SHA512

    92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

  • C:\Users\Admin\AppData\Local\Temp\begcabjfeh.exe

    Filesize

    572KB

    MD5

    6bf07399c81bdbc7b2eb15593d16682a

    SHA1

    6ce1a75917f90fd296b6f223f3d770c44c3dedad

    SHA256

    d7994191f8acb48b335346017afa50687e75dab488a4b2e344c1e00a15542e14

    SHA512

    e382ba3f6445a22cb578c7cf97087d8bd14bfd3de38e6d34fba9a9caf1662656e09d20a8c83d485cc999bda840ae907534deb501288fccf361eca9a7f3cc706c