Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-10-2024 08:25

General

  • Target

    97fd3759edf1a4f9e705f951ee1a19f741f8acce36a9c1b56d6dae870a5c1ab3N.exe

  • Size

    62KB

  • MD5

    8e393aea55cda0cf40b414aaf81a4f70

  • SHA1

    67265973bebe124552807158283175f3b2c5fa37

  • SHA256

    97fd3759edf1a4f9e705f951ee1a19f741f8acce36a9c1b56d6dae870a5c1ab3

  • SHA512

    f8dca6113873303173c4ee1b8632da775daaf14dbe9f13daa03e93ebae9691fb658916b37c0054419ef6e9478dbd41b381a5227de8f4c7b2fca58d6315f59cb3

  • SSDEEP

    384:asjPGY2HXgrkEYYhQ98E8I1XAV/QcaYpATUgch1A9NB/erxlFHXTFDCuz:aePG5H8XhKD8ISZQjkgs1lxlFJ+y

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97fd3759edf1a4f9e705f951ee1a19f741f8acce36a9c1b56d6dae870a5c1ab3N.exe
    "C:\Users\Admin\AppData\Local\Temp\97fd3759edf1a4f9e705f951ee1a19f741f8acce36a9c1b56d6dae870a5c1ab3N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2068
    • C:\Users\Admin\AppData\Local\Temp\winupdate.exe
      "C:\Users\Admin\AppData\Local\Temp\winupdate.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\winupdate.exe

    Filesize

    62KB

    MD5

    bf425f79143d9df247b95f4929fbe9c3

    SHA1

    46e641de087ec2eb887a32f9daadd509ddf6068b

    SHA256

    62e454a491642e40815cb951e45c0859333f38b0d74216c19687704cb12c75c2

    SHA512

    5dda2ac50cd4d67ed41b29ee19d36a0d72f377a7d41c577160db08cbc58731092ac36c03869803b69a23a4ae433d038e8388c0c535b17b9a3a2f3517f02fcb41

  • memory/2068-0-0x0000000000500000-0x0000000000512000-memory.dmp

    Filesize

    72KB

  • memory/2068-2-0x0000000000501000-0x0000000000502000-memory.dmp

    Filesize

    4KB

  • memory/2068-8-0x0000000000500000-0x0000000000512000-memory.dmp

    Filesize

    72KB

  • memory/2068-6-0x0000000002520000-0x0000000002532000-memory.dmp

    Filesize

    72KB

  • memory/2560-10-0x0000000000500000-0x0000000000512000-memory.dmp

    Filesize

    72KB

  • memory/2560-11-0x0000000000500000-0x0000000000512000-memory.dmp

    Filesize

    72KB

  • memory/2560-27-0x0000000000500000-0x0000000000512000-memory.dmp

    Filesize

    72KB