Analysis

  • max time kernel
    105s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2024, 02:05

General

  • Target

    DupInOutDuplicateFinderPortable/DupInOutDuplicateFinderPortable.exe

  • Size

    487KB

  • MD5

    8e333e2ed1e85be63d1c6466eac8f839

  • SHA1

    c913e6d79946b20139903b6372a420350c82bd56

  • SHA256

    7f72040e2217f0bdf1c851d256ceaff016ce81270db2e2eb6344880f396e5f26

  • SHA512

    7066eaeebf6aac73f6156dec92dba0734bbb75e9cfeffb5733910c768e8cdbd23b30dcbfddf9cc8719db1d479070e2485a84d699fae9f7d0b66f28d898ceed7d

  • SSDEEP

    3072:tRHvBKTWHnpx0IT/END9i/7ZhmLsCdF1V98OK15AoCUqX0:thvBGWHnpx02EnhLsst0AoCUd

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 4 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 7 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DupInOutDuplicateFinderPortable\DupInOutDuplicateFinderPortable.exe
    "C:\Users\Admin\AppData\Local\Temp\DupInOutDuplicateFinderPortable\DupInOutDuplicateFinderPortable.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Users\Admin\AppData\Local\Temp\DupInOutDuplicateFinderPortable\App\ProgramFiles\DupInOut.exe
      C:\Users\Admin\AppData\Local\Temp\DupInOutDuplicateFinderPortable\App\ProgramFiles\DupInOut.exe
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:3836

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\DupInOut\DupInOut.exe_Url_xqxizentoy2l5jvp4cit5xxnyy4lxxth\1.1.3.5\user.config

          Filesize

          125KB

          MD5

          fb6439e7a0d27564b2a2d3cf73225991

          SHA1

          99ded4b82b1bd1fe6df3e0e723e4226c27d3c2ab

          SHA256

          3668cd4c478eb3c889a383c66733ad900c03ab3385e66a851975971f914dfb41

          SHA512

          0d10d13e76a587287d6eb67895adfc0b8189632cbfde8ffb8bd2c05861876ca1722e4954ffd0f6791e4cbed87f0a05bb3fea45062aa3190654a9d07e0deeb313

        • C:\Users\Admin\AppData\Local\DupInOut\DupInOut.exe_Url_xqxizentoy2l5jvp4cit5xxnyy4lxxth\1.1.3.5\user.config

          Filesize

          163KB

          MD5

          43b1e9d1aa66b9408ed7f2bc5851fb19

          SHA1

          e9d3eee45abd2098653a38902c1dcdfa72bd7b5c

          SHA256

          b69ac60f1bd7146f84f7dae73340ada3f4fbb3c5221f4040b394a3187e5cc191

          SHA512

          9167dbb1b3fd8f57e4b9a68ce12e7ae90ffe27f7f09ef06960b6df8104ccfa0df94a7680543fd8c7d6f87dee69fe7b96ca50d0d422eca05b686a7df1a1849e48

        • C:\Users\Admin\AppData\Local\DupInOut\DupInOut.exe_Url_xqxizentoy2l5jvp4cit5xxnyy4lxxth\1.1.3.5\user.config

          Filesize

          165KB

          MD5

          86d865c3a11a76bd34d83d33ea47f30d

          SHA1

          d80fc1d2c2fda9570f12c0385656cd9ad904dc66

          SHA256

          4a1beeb38372a104dcd11ac3768be05de4720e5dbd868e037c68b469b6b9bb30

          SHA512

          15bf11c4564b038b5c6f8f471153757e25fa9d6b9e36ecc11879ba02a164cbed1aaafdb1ef9c11e922052ce559e50d113c0689c1068e243d4702593d730f778f

        • C:\Users\Admin\AppData\Local\DupInOut\DupInOut.exe_Url_xqxizentoy2l5jvp4cit5xxnyy4lxxth\1.1.3.5\user.config

          Filesize

          166KB

          MD5

          3482e49f5dbc707d63fa83aa46928ef5

          SHA1

          4afbdafcd6ba05b25f2a9377a9b5be6c86a5d082

          SHA256

          6f10c7aa5f9b212d41bff5ee0e8fae878e10440b34f684f43dc050a437feda8a

          SHA512

          894d7942db11910c582c811086a40c95bf48babac23f495ddb1e08ba8ab4f7015b401c7616c4bab10c746fc086144000d533339cc68d919834beb151204415d9

        • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

          Filesize

          9KB

          MD5

          7050d5ae8acfbe560fa11073fef8185d

          SHA1

          5bc38e77ff06785fe0aec5a345c4ccd15752560e

          SHA256

          cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

          SHA512

          a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

        • C:\Users\Admin\AppData\Local\Temp\nsv8791.tmp\System.dll

          Filesize

          12KB

          MD5

          192639861e3dc2dc5c08bb8f8c7260d5

          SHA1

          58d30e460609e22fa0098bc27d928b689ef9af78

          SHA256

          23d618a0293c78ce00f7c6e6dd8b8923621da7dd1f63a070163ef4c0ec3033d6

          SHA512

          6e573d8b2ef6ed719e271fd0b2fd9cd451f61fc9a9459330108d6d7a65a0f64016303318cad787aa1d5334ba670d8f1c7c13074e1be550b4a316963ecc465cdc

        • C:\Users\Admin\AppData\Local\Temp\nsv8791.tmp\newadvsplash.dll

          Filesize

          8KB

          MD5

          55a723e125afbc9b3a41d46f41749068

          SHA1

          01618b26fec6b8c6bdb866e6e4d0f7a0529fe97c

          SHA256

          0a70cc4b93d87ecd93e538cfbed7c9a4b8b5c6f1042c6069757bda0d1279ed06

          SHA512

          559157fa1b3eb6ae1f9c0f2c71ccc692a0a0affb1d6498a8b8db1436d236fd91891897ac620ed5a588beba2efa43ef064211a7fcadb5c3a3c5e2be1d23ef9d4c

        • C:\Users\Admin\AppData\Local\Temp\nsv8791.tmp\registry.dll

          Filesize

          29KB

          MD5

          2880bf3bbbc8dcaeb4367df8a30f01a8

          SHA1

          cb5c65eae4ae923514a67c95ada2d33b0c3f2118

          SHA256

          acb79c55b3b9c460d032a6f3aaf6c642bf8c1d450e23279d091cc0c6ca510973

          SHA512

          ca978702ce7aa04f8d9781a819a57974f9627e969138e23e81e0792ff8356037c300bb27a37a9b5c756220a7788a583c8e40cc23125bcbe48849561b159c4fa3

        • C:\Users\Admin\AppData\Local\Temp\nsv8791.tmp\splash.jpg

          Filesize

          2KB

          MD5

          b72fcb42942baa0c3d64a888bf690093

          SHA1

          73fccd630afc92fc6b4ed858b4759e656b1ca1bd

          SHA256

          da1ba320a3fdcf828c9b6f67a1f5efca679dd198f8798cd75fb9e87e3183dc2b

          SHA512

          fca1718551d8b655e0352c49850751fa7e5953f88c7874ca8dd43d08d08a3454b035e5233b1edd1fdd60891c700c6a67550af0029fc96460ebc01ae13ba55e1b

        • memory/3836-29-0x0000000000630000-0x000000000076A000-memory.dmp

          Filesize

          1.2MB

        • memory/3836-31-0x00000000052C0000-0x0000000005334000-memory.dmp

          Filesize

          464KB

        • memory/3836-35-0x0000000005C10000-0x0000000005C48000-memory.dmp

          Filesize

          224KB

        • memory/3836-34-0x0000000005AB0000-0x0000000005AB8000-memory.dmp

          Filesize

          32KB

        • memory/3836-37-0x0000000005BF0000-0x0000000005BF8000-memory.dmp

          Filesize

          32KB

        • memory/3836-33-0x0000000005930000-0x0000000005974000-memory.dmp

          Filesize

          272KB

        • memory/3836-32-0x00000000737B0000-0x0000000073F60000-memory.dmp

          Filesize

          7.7MB

        • memory/3836-36-0x0000000005BD0000-0x0000000005BDE000-memory.dmp

          Filesize

          56KB

        • memory/3836-63-0x0000000008C50000-0x0000000008CB6000-memory.dmp

          Filesize

          408KB

        • memory/3836-65-0x000000000D8C0000-0x000000000D8E2000-memory.dmp

          Filesize

          136KB

        • memory/3836-30-0x00000000737B0000-0x0000000073F60000-memory.dmp

          Filesize

          7.7MB

        • memory/3836-28-0x00000000737BE000-0x00000000737BF000-memory.dmp

          Filesize

          4KB

        • memory/3836-88-0x00000000737BE000-0x00000000737BF000-memory.dmp

          Filesize

          4KB

        • memory/3836-89-0x00000000737B0000-0x0000000073F60000-memory.dmp

          Filesize

          7.7MB