Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/09/2024, 00:16

General

  • Target

    98d622de317bc7e59fedd01069bc5b03a25f190d8573c1dfde1d8442afb7f8a9.exe

  • Size

    31KB

  • MD5

    c70e0b85934c8ed8139be1ce6d7ad17c

  • SHA1

    cb693515920c150264ebd8ca0d86ec31d06f584b

  • SHA256

    98d622de317bc7e59fedd01069bc5b03a25f190d8573c1dfde1d8442afb7f8a9

  • SHA512

    8aa38b80b0dd161ea3dc23aeed2d66d43ac06fda540fbf06fb864f69b78518a51b5726b0876dbf3f698040dd128d26e5cfea47ec9edfaa0f14a9654dde1688a8

  • SSDEEP

    768:/Bj3dfgZvker5BM2ECDVWl8zHPHXyXHCzcHHvzQBdi9vc:/BK8C5i2bVWl4vUv4Wvc

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\98d622de317bc7e59fedd01069bc5b03a25f190d8573c1dfde1d8442afb7f8a9.exe
    "C:\Users\Admin\AppData\Local\Temp\98d622de317bc7e59fedd01069bc5b03a25f190d8573c1dfde1d8442afb7f8a9.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\Admin.exe
      "C:\Users\Admin\Admin.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\Admin.exe

    Filesize

    31KB

    MD5

    1a32916ecd53e334c6bc30d20ae621b8

    SHA1

    3e987c7b41906e5a7316bda086b9d9dd100a91e1

    SHA256

    08db2fff0ec350d76a22353ef37bdaf4c07a0c895916f60c4b245955b56f428e

    SHA512

    1d9266cc57cc6946e595deffc72804c9402902641f453f675228e1b903d6e06d46f3afb1229e02d1fd8b4fc172df643261590ceb499f70701f886006e3f5fb52

  • memory/2096-0-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/3028-13-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB