Analysis

  • max time kernel
    26s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2024, 19:34

General

  • Target

    7max2401.exe

  • Size

    151KB

  • MD5

    3bc337b701c2c04f08a5ade9e3ef101c

  • SHA1

    6c21089c118ed85d0fa727721ceb137e90c3ab3d

  • SHA256

    1b3633e0fd0f901b02fde168de254856a37db602c25d3646bfb42db8ecbf6d8c

  • SHA512

    f2453a7a1bee84ceb1ec7d22e7536ad3100cb22315dd39a5c661b8f4ead9263a4aaa9096e084149a068021082e84e8f2cb7bc7ba981e4764c61241c7a07fa07d

  • SSDEEP

    3072:l+AQEcui7mktgTlkZN4gCrOfAXQxIUxCZUM2OULELIWZ:lZQEsiJqZ2gCqTINOnLRWZ

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Loads dropped DLL 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 26 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 32 IoCs
  • Modifies data under HKEY_USERS 9 IoCs
  • Modifies registry class 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7max2401.exe
    "C:\Users\Admin\AppData\Local\Temp\7max2401.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    PID:1164
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0
    1⤵
      PID:2724
    • C:\Windows\system32\csrss.exe
      %SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=16
      1⤵
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious use of WriteProcessMemory
      PID:1968
    • C:\Windows\system32\winlogon.exe
      winlogon.exe
      1⤵
      • Modifies data under HKEY_USERS
      • Suspicious use of WriteProcessMemory
      PID:440
      • C:\Windows\system32\LogonUI.exe
        "LogonUI.exe" /flags:0x0
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2248

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Program Files\7-max\7max.exe

      Filesize

      57KB

      MD5

      12488970b6c92a18557a92b4ad0a85e0

      SHA1

      418d92ec03a8fa1f11aa207fe0c8a05aa5cfe0ea

      SHA256

      e62697aa50664602e6ce5f9a27cea496a5fdf39e1bf7bd62a8a005e9b2759a5f

      SHA512

      a3bbfe8ee14e9b7b3e7fe9d7d1b21454d9b6ab924f85eff3170a13768477f2c130278ede9a374ab6101ae127f1ee349ebcc3e2e163a4cda50e99d85bb7463bf5

    • memory/2248-31-0x0000000002B30000-0x0000000002B31000-memory.dmp

      Filesize

      4KB

    • memory/2248-32-0x0000000002B30000-0x0000000002B31000-memory.dmp

      Filesize

      4KB

    • memory/2724-30-0x0000000002E10000-0x0000000002E11000-memory.dmp

      Filesize

      4KB