Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/09/2024, 12:09

General

  • Target

    f75b34adece3d9e9fb2fc972c0935eeefeac5de8af2fbc820dddf155d086d30b.exe

  • Size

    2.6MB

  • MD5

    65fb69f58da2be20c89c9a54f3fd87e7

  • SHA1

    dc1917fe3da39779ac14868570bcbf39c7aa162e

  • SHA256

    f75b34adece3d9e9fb2fc972c0935eeefeac5de8af2fbc820dddf155d086d30b

  • SHA512

    368b9d4a91ccfdde015e71dd1c8b4903d35db1ea21594e705bd7cd6f4dc0431f540504d72e908a226d426bd341d28c72e5ca2e8327c3e9303644a37b8144afdf

  • SSDEEP

    49152:QTGkQD5QZuTtS0rQMYOQ+q8CEFTG4QXTGHQl9KFeMU:QKk8WsM0r1QnuK4yKHy0Fe5

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Unexpected DNS network traffic destination 12 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 13 IoCs
  • UPX packed file 13 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f75b34adece3d9e9fb2fc972c0935eeefeac5de8af2fbc820dddf155d086d30b.exe
    "C:\Users\Admin\AppData\Local\Temp\f75b34adece3d9e9fb2fc972c0935eeefeac5de8af2fbc820dddf155d086d30b.exe"
    1⤵
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3460
  • C:\Windows\Syswow64\62969f63
    C:\Windows\Syswow64\62969f63
    1⤵
    • Executes dropped EXE
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:3628

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\62969f63

    Filesize

    2.6MB

    MD5

    74d450e3612b88eeeb62069dea1bf27c

    SHA1

    e57b3d1b1a9a539a406a447134cb201f173afb3f

    SHA256

    4fd682d6a2da13ad36f321dbc26d83318bead70bbf247b124003429db4215419

    SHA512

    1927e9bf7b6e2c0b9d414c519bac61dc57bd85af53989d864324b5a924130822068b6747bf49306685893443c2e16c770f45845b31a788c2143f91ad63fbaed5

  • memory/3460-36-0x00000000009A0000-0x0000000000A29000-memory.dmp

    Filesize

    548KB

  • memory/3460-16-0x00000000009A0000-0x0000000000A29000-memory.dmp

    Filesize

    548KB

  • memory/3460-0-0x00000000009A0000-0x0000000000A29000-memory.dmp

    Filesize

    548KB

  • memory/3460-38-0x00000000009A0000-0x0000000000A29000-memory.dmp

    Filesize

    548KB

  • memory/3460-50-0x00000000009A0000-0x0000000000A29000-memory.dmp

    Filesize

    548KB

  • memory/3460-51-0x00000000009A0000-0x0000000000A29000-memory.dmp

    Filesize

    548KB

  • memory/3460-52-0x00000000009A0000-0x0000000000A29000-memory.dmp

    Filesize

    548KB

  • memory/3628-3-0x0000000000090000-0x0000000000119000-memory.dmp

    Filesize

    548KB

  • memory/3628-18-0x0000000000090000-0x0000000000119000-memory.dmp

    Filesize

    548KB

  • memory/3628-19-0x0000000000090000-0x0000000000119000-memory.dmp

    Filesize

    548KB

  • memory/3628-37-0x0000000000090000-0x0000000000119000-memory.dmp

    Filesize

    548KB

  • memory/3628-39-0x0000000000090000-0x0000000000119000-memory.dmp

    Filesize

    548KB