Analysis

  • max time kernel
    141s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    12-10-2024 15:23

General

  • Target

    2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe

  • Size

    388KB

  • MD5

    7460a359bf50d12d26232d79412a3eb7

  • SHA1

    59ef372a1a44bea53474700ea1479d36e668b9a8

  • SHA256

    5c946780a5cab532e7c437b8b555456b319736e40b524446ce350efd29790f89

  • SHA512

    1b1fcf81f063f66e83fa699de374139c5e220d61062a337adb0280e901279c1278458102c38ebe04e9bc147e9a55cd87086dc31dd08da03d33cf0fb06c604b31

  • SSDEEP

    6144:/aPIWVeTdJKsLxgcSNDQL5Q9VuwLmh0kdH371oHVCvvm:/uTs1gBpQL5kmh0671o1CG

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-10-12_7460a359bf50d12d26232d79412a3eb7_7ev3n.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\users\Public\conlhost.exe
      "C:\users\Public\conlhost.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2620
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c C:\users\Public\del.bat
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2376
      • C:\Windows\SysWOW64\REG.exe
        REG ADD "HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "allkeeper" /t REG_SZ /d "C:\users\Public\conlhost.exe" /f /reg:64
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2356
      • C:\Windows\SysWOW64\REG.exe
        REG ADD "HKEY_CURRENT_USER\SOFTWARE" /v "crypted" /t REG_SZ /d "1" /reg:64
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\FILES_BACK.txt

    Filesize

    215B

    MD5

    ad88f1fc00d22a7a401142e9b02d159d

    SHA1

    6eaaa383f2e04efc290f368b55a7323fdbe7b986

    SHA256

    a897b00e72bee37fff4d2f80786c00638c0e75bdc183817b624a8daae899a286

    SHA512

    318503eb1c4a842955fbb4b953b16857717ee0345dd17238cbc3ef0ffdfdf9e959468c8f0973a46e39b9e08a3e89ef1a7f2c6df91377f68b4d3e3520e321f966

  • C:\users\Public\del.bat

    Filesize

    115B

    MD5

    fe2a06d784fe2f25235373e73049b386

    SHA1

    b9a61457a8119dd9ebb449a3f114513a361d0eb2

    SHA256

    2ae1e4904dbe4f97f20a07ad3b44961a9beae8c92525f3da24e16fa662519058

    SHA512

    3f64d9f8ead2916e02a3db9baf345397972565bc4616968996f9c04515cd90b5550f09a66bf5b1928be6874dae1db0ba632e23e2ae8c51ffefadd9bfffce1f06

  • \Users\Public\conlhost.exe

    Filesize

    388KB

    MD5

    18643a9a18ee51febdff616ab9072d7c

    SHA1

    1240c1e4716d7cf6cc4ac37f7aec6b15fd7b845d

    SHA256

    1dc6bbf348071f817ffadc7f5c9907e96db25beb7ce19cd6da5309549d26fa14

    SHA512

    ecb123d3be558f6b5dc479b565b77339570f87c963db5b1334d7022436587e40c610e4bdebb1e7b3ebea588df54dcae1932ceb3eeaeac886f4f9be5494234697