Analysis

  • max time kernel
    118s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01/10/2024, 20:30

General

  • Target

    ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe

  • Size

    7.8MB

  • MD5

    5974fe67fc4651e2e9cf06d1eaf7f530

  • SHA1

    22465d3e1e6d6253c4b553005aa8e3bc2726370c

  • SHA256

    ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7

  • SHA512

    bdddd1511adecc262b4a3d53c00d426d6adb6a3b88339ca7e1e755b84413ee93e32ed7efe24735c96bb3f1b7a64788ca1d57e3c936cf61b784e2e27859167a80

  • SSDEEP

    196608:kOfsUO1xZxeYs6BBnGcFgPNk/JXa5HZ0Rv91Ddqt8fUpRnOW:kOfdoZxeYsCNyyRXG0Rlc6Up9OW

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe
    "C:\Users\Admin\AppData\Local\Temp\ab6dfc4b561b3a954c52c334a2399da9d0c4fa995c81f9d76b4a7a8c20abf8b7N.exe"
    1⤵
    • Adds Run key to start application
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3064
    • C:\Windows\SysWOW64\setup16.exe
      setup -m "F:\msdownld.tmp\IXP000.TMP\setup.exe"
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:924
      • F:\~MSSETUP.T\~mdac.t\acmsetup.exe
        F:\~MSSETUP.T\~mdac.t\acmsetup /t mdac_typ.stf /S F:\msdownld.tmp\IXP000.TMP\
        3⤵
        • Executes dropped EXE
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • F:\msdownld.tmp\IXP000.TMP\HANDLER.SRG

    Filesize

    510B

    MD5

    9affddc9de4ba7f5385ccc2801b52ade

    SHA1

    15de16c5d5cc4af98b7d33a4950cf9c0380a57a3

    SHA256

    82954440bf5bf4dd63c4301e6587d98cc816fb94f2e8c4d88bce2ff55d859ec1

    SHA512

    995a3ac82e418866dce4e971b322c9004d2f7722a2b93d5503a0fc87b4791721687881c16c17f256b743ec78591482c35f0495936a0fdc2c3bd8a22469737848

  • F:\msdownld.tmp\IXP000.TMP\SelfReg.dll

    Filesize

    31KB

    MD5

    a88346c7d3c20df8ee796012330b6fc2

    SHA1

    d0c1593845a67e760aa0ffb2b3c391e295f10f45

    SHA256

    8878e1e600abeb4bd7324a8435f8ffcaea438743bdc9e0da154bdcf8ecc879a3

    SHA512

    1a5ba18969dd1067b0c2dfebb84f09f121698c7290e5a5ccabb1c82aaeffa567f25947243a66d3584516791aee33f066651f044e5de6dfcd73bcdb82f866853c

  • F:\msdownld.tmp\IXP000.TMP\acmsetup.exe

    Filesize

    362KB

    MD5

    9b658a7e2ce494d53e79392ed7400f68

    SHA1

    78ce8f8bb29268ca096b3a4b8b5a983b5cfe24e1

    SHA256

    65ec6d4ffef9bca6883943ab44b28033f2abf1646cf49b3ae3aeb8bb699f3af2

    SHA512

    9fe33ad422ef66b1c6f2cb66a51acfad6410960795aa52653c9f6b2d8ba62200321d49890890a6ceca2b961a9bde234e8217029a741525130f775b62db7c9159

  • F:\msdownld.tmp\IXP000.TMP\acmsetup.hlp

    Filesize

    14KB

    MD5

    73c25ae0c1769d5f9224c42918b1e02c

    SHA1

    83e8a696e68afdb91de5068fa1b4006a81c47ab4

    SHA256

    bb01707fe351952e3719fafa3361642b81069733e6ce83b06b78ddc779eaaea8

    SHA512

    49e969711a06c4f8f42ff0992d0fb51e3c57acce4f2d3d02cd2a51a4147ac7360b54233c0036d6f148001fdf599cdf176fbdc111f3096edf05d7b8e275d1cc39

  • F:\msdownld.tmp\IXP000.TMP\advpack.dll

    Filesize

    73KB

    MD5

    81e5c8596a7e4e98117f5c5143293020

    SHA1

    45b7fe0989e2df1b4dfd227f8f3b73b6b7df9081

    SHA256

    7d126ed85df9705ec4f38bd52a73b621cf64dd87a3e8f9429a569f3f82f74004

    SHA512

    05b1e9eef13f7c140eb21f6dcb705ee3aaafabe94857aa86252afa4844de231815078a72e63d43725f6074aa5fefe765feb93a6b9cd510ee067291526bb95ec6

  • F:\msdownld.tmp\IXP000.TMP\common98.dll

    Filesize

    180KB

    MD5

    2afc512e9c0b08f6e68f64c14e2ac604

    SHA1

    41b90f7d06550b9f2502ed8b32534a38a7687c11

    SHA256

    2dbc87859812b6b6984cab01814a662fec2cc69560e8c1969abe58cc0d0d957d

    SHA512

    a6a2c6324626d3d6d5b89fbee6fa7ec5793f4b297f9ff8b63bd6603a5cdde6c961636afff99522979c75a9375463e2ea128bda3e40225204f3a4d314f0a9fc5a

  • F:\msdownld.tmp\IXP000.TMP\mdac_typ.inf

    Filesize

    10KB

    MD5

    bb3291b2addc51860d724e44460a50ba

    SHA1

    58055cc8a1f8aef5e075ee34b943ef4d8c30c08b

    SHA256

    63c50edecc6d5c1df94fbc9ccb0c88b8e8486be77681196e7b61c4b3afacd75c

    SHA512

    02b7df2a8f1f450dce8dfa91792bbf3e8d96138c945057971e7da3e9edf37658b0d8ddd735a423cce008a9c626fa3011cbdb17437086a699d88ab52f9bfc44f9

  • F:\msdownld.tmp\IXP000.TMP\mdac_typ.stf

    Filesize

    18KB

    MD5

    04779a4e3826b45173c9a36576d51a81

    SHA1

    4981a701128a15a87a2c4a70f73fa25ba253738a

    SHA256

    ed001bf50f66901c40a01326405638185a8604caa045bb0fef8402bfdb59bbb1

    SHA512

    9eb6db77c4328222f8fd37f3f4e9821ac9e7c54c6104485ae2c8453132b83fa04adb7c9502b62afb7808f55c1548edf9270928ac3470b38120a83da973f5d88f

  • F:\msdownld.tmp\IXP000.TMP\msdasc.dll

    Filesize

    423KB

    MD5

    b7bacd398e382b3e5998bb2053625563

    SHA1

    21fd13e22f06ffa87d373e131973738fafc8502e

    SHA256

    666781754d3365d1d7ce632bf2fe67bc803ccdc754a5013471dcb9e73c7815df

    SHA512

    16894a80add250edb205ac2b414cc632b49b24a26e06acf8f186eed0794e619ce3d8c02d8f056b5c47b26ef7de4dbce327df4fce95f4b25e449da3649d40776d

  • F:\msdownld.tmp\IXP000.TMP\mssetup.dll

    Filesize

    276KB

    MD5

    d5d072540f69cdcae1ddec6f116ea65a

    SHA1

    0e105e6968d868ba23b13d9eb1e83a34c2015aea

    SHA256

    b9b3abb404481d98b0cb8ec3dd728f12a3f2505d4cc7e4c59e8509abfa694710

    SHA512

    64748600aa32181d7ce5ad82238bc84606931275aff58858578fd9bc5c01fa7809c095195939c3811e91362f2470abeebccd93ed7921bd3342f7fe13a96fac66

  • F:\msdownld.tmp\IXP000.TMP\msvcrt.dll

    Filesize

    412KB

    MD5

    779c065d6bf4b0d5c3f7edbb4248b84c

    SHA1

    12607c24cc7faf12e66de07163dd591f46473880

    SHA256

    3ef37b982dc58b12f72c978e0bdc19f6af74fd2a582818788d422b6914c0698d

    SHA512

    8b1ad291e6eca82cd3d63637ad14d6f5a1a27566c3ed59cced7591134719acd25f15865ac06e4c17d0d0cac546bdbfcc082ac6bf79da3ef898a3a2018cd98b9e

  • F:\msdownld.tmp\IXP000.TMP\odbccp32.dll

    Filesize

    85KB

    MD5

    08f4182e94ea4cd41ff12ecf8ef83556

    SHA1

    17baed3cfe30d4cf41e01167ca67c88e7f22b30d

    SHA256

    aca13860b6a02749fe42e0f8cd856787065688071a27a7fb78cbba445a22c435

    SHA512

    1d5daf32a08bf3f15737582a33ec879d8b7b8eb4c5333a360c80de2b76580582a0bc4871b09c23e0a0bbe8fca46ab735599338029af5f37e9e23c4b183b641c8

  • F:\msdownld.tmp\IXP000.TMP\odbcinst.cnt

    Filesize

    324B

    MD5

    c750112871fc7d6a37b9db626d2acce4

    SHA1

    ae5d8fc99ee00698cdd853d096aaf46db7801306

    SHA256

    13c8f2c4daade76c7e4ad4a4352d46fce89abd06857f2c76347945eb230ea387

    SHA512

    f05875b3cf2890a083480373ee15ec468b5d2df7385aedf0eb73e8c15551550738fbfeaf51875aaf80534c90a3dff08bd1fe6c31eb478b922d2cf010bab892e3

  • F:\msdownld.tmp\IXP000.TMP\odbcinst.hlp

    Filesize

    47KB

    MD5

    933be9555b1ba4abf3ac8956511e0ed2

    SHA1

    0fd746bbc8465cae825f50e84139c3444fb9e2b6

    SHA256

    6eaf180fd595d8e572da8c1739d0f231ee462951cd73b84e575082f905e5b50b

    SHA512

    4f51166976617322c4c91a80668931b515c68e3732e1c6deb2acd44c34dcb13fd99e0f865448900b6bc35d2bc6a983a252dff7228177c53f4ba159eef51ad421

  • F:\msdownld.tmp\IXP000.TMP\odbcint.dll

    Filesize

    67KB

    MD5

    6c58ec355ade4b1d14d59560b8e57c5e

    SHA1

    b8a3cdadd63c1857903b78af2b33dfd8ebdb8572

    SHA256

    f595054f3a56c87559e384a3ee942821768a49e78ed093221cb6badc022551e9

    SHA512

    7f56c48e34e1c984eed6ac06eee25e714a4aa93f08a3b5b5a45f8af729e167f6f60bbdd6b27763ee858e90d78de01058736f2ed7bb2465ca9cb2ee1f728cf58d

  • F:\msdownld.tmp\IXP000.TMP\odbckey.inf

    Filesize

    3KB

    MD5

    8a167d44d02c33aa5d8e52716e2c38cf

    SHA1

    792a2dcba28f5a9cbc1611e79ad1d594ad39ff7c

    SHA256

    f765a7227d81020b1c69359fe014ca941db5390660513f0070f27e3259aad716

    SHA512

    c28b024aedc28c706d2217c39354bfbc45d3071e783719d514c7c5db42bd8f3528ce4d9484c656b208be615eeadbb9de144bb9f87265a1c237fdaae2490e3310

  • F:\msdownld.tmp\IXP000.TMP\odbcstf.dll

    Filesize

    23KB

    MD5

    9e68f82c086bfcec7468e276cd257367

    SHA1

    6ad8c341ae909676e68285e23aa3c4742820ea38

    SHA256

    220dce873eb69e71935bf53068f7e33a44cf500c87106631eb5aca448fc61a2e

    SHA512

    4bcddc1f5aa90fdf97bb635fed9699cf2249e36cca8b18a3961e472dff58c956898863677686cfeaef26156f6af704256a420ded585ccffdf30b2b0a3e7e6470

  • F:\msdownld.tmp\IXP000.TMP\qfeupd.exe

    Filesize

    155KB

    MD5

    b6873acd87663d9e22725670911b586b

    SHA1

    f146352286dfd8145a9d5064ad81b499ec523f2f

    SHA256

    5cc36ea73ca05fe2b5784332b6452ec4b1625905059e973072c62cdaf503f2c4

    SHA512

    66e66b07039a447907bc9a7d7d08a903bc58a204a32f1c37d95dc48bb37ce180127fa46249cd4a2b4c3759a4423e5f1ed11c9e77369754c182812c3199c366a2

  • F:\msdownld.tmp\IXP000.TMP\setup.LST

    Filesize

    1KB

    MD5

    dd74ecbc7334882c5042861d747c45d9

    SHA1

    936f8bd60ccdf3af7f8b656feb2b12502152dbd4

    SHA256

    660a977edbfafbb2e706d5a9854839bd6b335295489a0550767a948ee1358243

    SHA512

    64ef77f1bbc1e16c630082771f36d1dfb8e6c38b725ab31c961d7a6c1da67993bc23d32180937ec1bdaba8df8307c0b67a2ca9f64d68b084a13a5e016401ebd0

  • F:\msdownld.tmp\IXP000.TMP\setup.exe

    Filesize

    72KB

    MD5

    eafa2804a87078afc643f8148dd8ec78

    SHA1

    5480542cf7b3bc18735044116acc6a341734ae71

    SHA256

    e40a42fafeb4d353f54aa766714577a14956c063450058cb70d48b41f5739063

    SHA512

    50fffecff1dd81bf7d851b38c809f3a20a4c224e80954fdbe53bca6e92d96ed1f8aa542cd22eea57f4ed1a8533f3fb9de500dd6d1f0a071529fd9587d7c07ee7

  • F:\msdownld.tmp\IXP000.TMP\setup.ini

    Filesize

    149B

    MD5

    6822179556122e9bbca69d177e24ca36

    SHA1

    2669511fb9f2373546b45680b46b59c29bece8f3

    SHA256

    194250402400908a1051115b5a05d18473d0f8f8e9dfffdb10b23b583987b765

    SHA512

    439893a10338d77f8b1f0302034894a699d50c25500405350e717cb9a24c08efeb5d0a5367ae07d64cb2e66e8b8419b80429206b244243a0d0b3f4f65072013b

  • F:\msdownld.tmp\IXP000.TMP\setup.tdf

    Filesize

    84B

    MD5

    0bc2472ec42a4fc4742c817b121a0c57

    SHA1

    7328477a9f2311d9e4d72e1ea261031fbb19fc92

    SHA256

    0879e69ee425d61731589b4331358d20248c58362dd636f84b5a513f0aa4bd81

    SHA512

    cccfad839371a41e8ca65e57165beb55059580cdfc8abb4b73e60823ca95473783aff6e02997b6a506ff6ebb5eaff86737e9db19fc4cbe06574f9224f04d7376

  • F:\msdownld.tmp\IXP000.TMP\w95inf16.dll

    Filesize

    2KB

    MD5

    7210d5407a2d2f52e851604666403024

    SHA1

    242fde2a7c6a3eff245f06813a2e1bdcaa9f16d9

    SHA256

    337d2fb5252fc532b7bf67476b5979d158ca2ac589e49c6810e2e1afebe296af

    SHA512

    1755a26fa018429aea00ebcc786bb41b0d6c4d26d56cd3b88d886b0c0773d863094797334e72d770635ed29b98d4c8c7f0ec717a23a22adef705a1ccf46b3f68

  • F:\msdownld.tmp\IXP000.TMP\w95inf32.dll

    Filesize

    4KB

    MD5

    4be7661c89897eaa9b28dae290c3922f

    SHA1

    4c9d25195093fea7c139167f0c5a40e13f3000f2

    SHA256

    e5e9f7c8dbd47134815e155ed1c7b261805eda6fddea6fa4ea78e0e4fb4f7fb5

    SHA512

    2035b0d35a5b72f5ea5d5d0d959e8c36fc7ac37def40fa8653c45a49434cbe5e1c73aaf144cbfbefc5f832e362b63d00fc3157ca8a1627c3c1494c13a308fc7f

  • F:\~MSSETUP.T\~mdac.t\_MSSETUP._Q_

    Filesize

    424B

    MD5

    e846071c193b5acde9a677f0407881ca

    SHA1

    6c48d01c259894e5dbbf8c0dd6286d27d8de54b7

    SHA256

    3b47490b64ca59548fcbb15939721269f4262272af46ce84798738cafae4fb32

    SHA512

    bfe31f3c1b6792e839ae18f1dd79e04fa3d60d7581b23cbfd3ad3f5b7df875e94f5bb13c92c1b203f99174e3979a456d96ca65f1f494406c4f29a390b904b2ee

  • F:\~MSSETUP.T\~mdac.t\_MSSETUP._Q_

    Filesize

    1KB

    MD5

    983ab7cc7e33fde9480b1a680abc093f

    SHA1

    910e56f2f178a82a5acf7bca62d5ba5de76bf88e

    SHA256

    8f6e1e97be6d1d6b9d0089a6c32d4123d3a4a3950f1b952d67e9d8a8d388eb7c

    SHA512

    9f766a69fe10fe9d7c4be07f77cbf1efe48f435dfb7fc2fd50ff6fff811e8ad694685924bf669e12f715836288e82cca900842ab57c2269f3312163d684d84e3

  • F:\~MSSETUP.T\~mdac.t\_MSSETUP._Q_

    Filesize

    1KB

    MD5

    32ff2d3021b65f18a6fb2840913ee4b0

    SHA1

    5f54322d75112ea8bab954e89d5353d16123a0f4

    SHA256

    cc51fd2445de59dc6a27b4b9f43bf3fab21603b96fe22c6dcc6e8edf545e5d91

    SHA512

    4ecf97a32bd5b836133f148a6a989d6ddde4156c316433e40c595a7c2835ff54e0182369e4504fecd6fc60cc9b73aa532a6e68827a1ecda5a5c07ae2a1f80fd5

  • F:\~MSSETUP.T\~mdac.t\_MSSETUP._Q_

    Filesize

    1KB

    MD5

    ae27d7f8fa0f1aed1cd603bf69857336

    SHA1

    ba6a945f19b40e672f285c427ddf18f662c03ae5

    SHA256

    1d2b67e5c89949afa22cda8c3fa5d973c221a6c8af708334d2ab92c7f910bdab

    SHA512

    fc24de7093337d5267d36e1fbcc4c306cc0b489a6bec894c2d37ec8702b7b371829b6ad48240af986db44900061a184cb03f4385bcb0d2384bab2425eefda629

  • memory/2760-434-0x0000000000280000-0x00000000002B2000-memory.dmp

    Filesize

    200KB

  • memory/2760-442-0x0000000000280000-0x00000000002B2000-memory.dmp

    Filesize

    200KB

  • memory/2760-441-0x0000000000270000-0x000000000027A000-memory.dmp

    Filesize

    40KB

  • memory/2760-440-0x0000000010000000-0x000000001004C000-memory.dmp

    Filesize

    304KB

  • memory/2760-439-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/2760-444-0x0000000010000000-0x000000001004C000-memory.dmp

    Filesize

    304KB

  • memory/2760-443-0x0000000000400000-0x0000000000460000-memory.dmp

    Filesize

    384KB

  • memory/3064-0-0x0000000001000000-0x00000000017D9000-memory.dmp

    Filesize

    7.8MB

  • memory/3064-284-0x0000000001001000-0x0000000001002000-memory.dmp

    Filesize

    4KB

  • memory/3064-1-0x00000000017E0000-0x0000000001FB9000-memory.dmp

    Filesize

    7.8MB

  • memory/3064-467-0x0000000001000000-0x00000000017D9000-memory.dmp

    Filesize

    7.8MB

  • memory/3064-468-0x00000000017E0000-0x0000000001FB9000-memory.dmp

    Filesize

    7.8MB