Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2024, 21:58

General

  • Target

    3916ef0f58334f64b841491ce083db332c707357998a08f9deab4d2fabe9e213N.exe

  • Size

    943KB

  • MD5

    e38acd21d77d64b54f43a5a630f28220

  • SHA1

    0ea55e517edfa351831f1dbbd4c5f982fa2e31d5

  • SHA256

    3916ef0f58334f64b841491ce083db332c707357998a08f9deab4d2fabe9e213

  • SHA512

    87625821893fddc6f056e9a939b24683c813a7a828806ddd1a87d0d53054535e4ab97d099c47da77d53fad58c07643565b71ec8c9b761b3f94416b87a6d6096f

  • SSDEEP

    24576:v6Zv2ivhBVnFvh5Q44+iiEb0f2Q5tUTiZP0isKRrNq:vE2ivhhUK9f9gfisKfq

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 1 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in System32 directory 6 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3916ef0f58334f64b841491ce083db332c707357998a08f9deab4d2fabe9e213N.exe
    "C:\Users\Admin\AppData\Local\Temp\3916ef0f58334f64b841491ce083db332c707357998a08f9deab4d2fabe9e213N.exe"
    1⤵
    • Boot or Logon Autostart Execution: Active Setup
    • Modifies system executable filetype association
    • Adds Run key to start application
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2324
    • C:\Windows\svchost.exe
      C:\Windows\svchost.exe
      2⤵
      • Boot or Logon Autostart Execution: Active Setup
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2332

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\concp32.exe

          Filesize

          948KB

          MD5

          88b611609f364492779f0f1423167960

          SHA1

          3dfde58e6ff5608b8c238d1e92ec09e81546d773

          SHA256

          dcf86671b27b937d5d35a410e73967c09f8e1343824d233e8a7f37e4695c8c26

          SHA512

          e978e4cf5c2d2f402176dd466e2fb0a725426b65a317156fe9ca1a51d235e6f08068994d05254fee35fcd68b86f8b2990dd007fef0585e111416eb7a81fd9e8d

        • C:\Windows\svchost.exe

          Filesize

          948KB

          MD5

          2c739b9705fdbc951898536ac0b8dedf

          SHA1

          6670499f2aed61187b140d4508100bf3a009f8d4

          SHA256

          bd78adef31cb606108b2ae1434665a423e364e6a6693e7829e145c257ab69892

          SHA512

          6080d908b623bfc9682274af9a72ba79569d04e4ba8738e3bedb06bcd7f1ef3aa51d2620645359e700fe2b85e363e3eac8c3377abc7076d2253c5ec643d9b577

        • memory/2324-0-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/2324-13-0x0000000000220000-0x0000000000259000-memory.dmp

          Filesize

          228KB

        • memory/2324-15-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB

        • memory/2332-16-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB