Analysis

  • max time kernel
    15s
  • max time network
    38s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 23:32

General

  • Target

    7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06.exe

  • Size

    49KB

  • MD5

    a7cee4cbe778ccfe05f752478358c9eb

  • SHA1

    7617bbb5a45b4c65cd02495b0de8aeec6d86dcbc

  • SHA256

    7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06

  • SHA512

    5a6dd9eeb9063afef94437a0d16ad9897591f9438c48ff0876663ba4576255f85c581ab13c8d9877c1cdc9216409b67aeedef52f684f7b44098c0c6b0282c050

  • SSDEEP

    1536:stdgI2MyzNtRQtOflIwoHNV2XBFV72B4lA7PsnPH8WOfR:stdgI2MyzNtRQtOflIwoHNV2XBFV72Bz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06.exe
    "C:\Users\Admin\AppData\Local\Temp\7942fb315e85bc62b7752d9a7f90ffde2bd9feb1ebdcf2f515655aee0bee0d06.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2904
    • C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe
      "C:\Users\Admin\AppData\Local\Temp\hhcbrnaff.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2860

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\hhcbrnaff.exe

    Filesize

    49KB

    MD5

    a0bc4f18b9afabd5bd524cbc653e2a22

    SHA1

    81c51c1eee0e2ee88513b0ce34de6170460d8163

    SHA256

    46a4caee53548c8a67ae15641c1aff8f26b0bf51ebe06ab68c480cb4ec7788db

    SHA512

    1f3de3c58ee22630c59f40e988f23a1dac31543c0627cf90e733e4bb01e012ae9e5423217fe7e369575d08010df33c4009525f10ca004b2e0eda4c68d0754b69

  • memory/2860-14-0x00000000026E0000-0x0000000002AE0000-memory.dmp

    Filesize

    4.0MB

  • memory/2904-0-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB

  • memory/2904-1-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2904-2-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2904-4-0x00000000026D0000-0x0000000002AD0000-memory.dmp

    Filesize

    4.0MB

  • memory/2904-8-0x00000000030E0000-0x00000000030EE000-memory.dmp

    Filesize

    56KB

  • memory/2904-11-0x0000000000400000-0x000000000040E000-memory.dmp

    Filesize

    56KB