Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12/10/2024, 03:05

General

  • Target

    d3d83401fbd3b1eeefaf46caf3a3798eae60e9debb52581bc26d8a3dc5068d87.exe

  • Size

    612KB

  • MD5

    416b1c5c5756c5379bbac6ac54bcda0d

  • SHA1

    1d1d180143bdee134e31b71a69f1927f5f1e8774

  • SHA256

    d3d83401fbd3b1eeefaf46caf3a3798eae60e9debb52581bc26d8a3dc5068d87

  • SHA512

    8c036b436aa0860d0279de9f244a46c393456854961a0be4dca9ec53cad493efbe9be9b99af199e5eaf4437c33d0178f058100d96866ca5c8bb0baa25819890f

  • SSDEEP

    12288:PBAsu/1OsCzbT7YebtN2rMFpouF0/DD0:YMzEgNPFpoz/0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in Program Files directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d3d83401fbd3b1eeefaf46caf3a3798eae60e9debb52581bc26d8a3dc5068d87.exe
    "C:\Users\Admin\AppData\Local\Temp\d3d83401fbd3b1eeefaf46caf3a3798eae60e9debb52581bc26d8a3dc5068d87.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Program Files\present\alternatives.exe
      "C:\Program Files\present\alternatives.exe" "33201"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:2540

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Program Files\present\alternatives.exe

    Filesize

    613KB

    MD5

    2f39c78a02032acd9d9dbb9e121c92f2

    SHA1

    4c97b62e4032eb05e3d957655628d2d24e6e6dac

    SHA256

    319d40602f9620f22e20d1d1f8675af2f78bf608bd0aed20ca3c746afcd0cd35

    SHA512

    d85c85081fb0d4552cbf79228642cccc297f30e407687f77a0982dddd1a7348994673cb79e1c773e0441036d946d8a4c2b142980bc2bb1eee3b419df7555b24b

  • memory/1900-0-0x0000000000400000-0x0000000000581000-memory.dmp

    Filesize

    1.5MB

  • memory/1900-12-0x0000000000400000-0x0000000000581000-memory.dmp

    Filesize

    1.5MB

  • memory/1900-10-0x0000000002A10000-0x0000000002B91000-memory.dmp

    Filesize

    1.5MB

  • memory/1900-9-0x0000000002A10000-0x0000000002B91000-memory.dmp

    Filesize

    1.5MB

  • memory/2540-11-0x0000000000400000-0x0000000000581000-memory.dmp

    Filesize

    1.5MB

  • memory/2540-13-0x0000000000400000-0x0000000000581000-memory.dmp

    Filesize

    1.5MB