Analysis

  • max time kernel
    120s
  • max time network
    56s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    30/09/2024, 01:38

General

  • Target

    3f2e0285c15ee96e62ff200e3b1b30f35afdbafedd891f184b35abbfa9e47671N.exe

  • Size

    152KB

  • MD5

    fb3486925e98d9de7a1706caf8ce4b80

  • SHA1

    1c88d00f934d989a7f7c497b5a129b82ccbe89c7

  • SHA256

    3f2e0285c15ee96e62ff200e3b1b30f35afdbafedd891f184b35abbfa9e47671

  • SHA512

    3be7097f6e0bf713968697471461b0c2f89b12433126f075eb17299f49f5f250bb73a9168a98a3d2ef4f7f1bc6af7c04ba433ab2cff3dd59204c84187efdaef6

  • SSDEEP

    3072:V5EGRHCzwrCaHHvhtbz0wXtV2eZDEUXni7fo7KSif8xWM33r3k1jTCZU4oQZiE35:sGBCzwrCW/0AHa8nuo7KSif8xWM33r3v

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 52 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f2e0285c15ee96e62ff200e3b1b30f35afdbafedd891f184b35abbfa9e47671N.exe
    "C:\Users\Admin\AppData\Local\Temp\3f2e0285c15ee96e62ff200e3b1b30f35afdbafedd891f184b35abbfa9e47671N.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1988
    • C:\Users\Admin\wepow.exe
      "C:\Users\Admin\wepow.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2448

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\wepow.exe

    Filesize

    152KB

    MD5

    9b4177fd9ec6c4989ea30c26e143cc93

    SHA1

    5f6690ccdada54e19b00cc8ab84dc5249b9f95fe

    SHA256

    acb75780c41b73594253bd7e5ba8613995fc499a2309aa6831752c3bac45bcd7

    SHA512

    d0ece113a75737e6339d1200b99c592e0a3ea95349e1683b43ee8eb72793fd3717266a07f551918739710e85393b1660f0b39df90ee9e484a49780b9792bdec8