Analysis

  • max time kernel
    150s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2024 09:33

General

  • Target

    v/v.exe

  • Size

    2.1MB

  • MD5

    4f6c09480ef5f7a4adf9179ae871c353

  • SHA1

    6186f27d9769460c2327ded74269dbd2c237f1b2

  • SHA256

    ea9a07fabd737229a5a230398b40ca2b73ceef44a17d1c52555a339eafd89c41

  • SHA512

    f89a4fb314e4f3c8216179ac04c908dd8fa4305c272272af4e6e9b85cd0a3738f7c06e263372e3f15550ba26334480882a31a70863468c4ab2c2ea3b7ead669f

  • SSDEEP

    24576:zSHvVDWZnUiwhAC2d2DN5VKXUSCi9wVXLxyLQJNyET/WAcjZRBKRDcL:zYq7dC2d2DN5gXUA9KxyLQRT/9clf4A

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\v\v.exe
    "C:\Users\Admin\AppData\Local\Temp\v\v.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Users\Admin\AppData\Local\Temp\v\v.exe
      "C:\Users\Admin\AppData\Local\Temp\v\v.exe"
      2⤵
        PID:10876

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      6bc6394dde6d747cd3e28e268bddb2c9

      SHA1

      dd39b5c6e06bcefc0ea74a9af2f38e4abac1b26b

      SHA256

      13af37e7e61bd8b0bcdba32088c835a2cb301ed282d35f036ad827cb9f187ed8

      SHA512

      76b7d5c9a05fdb15fc9b99e63d59039ff516e5028c15fe85ca576d0371aef72998dfcbd192605379760cc7bb222f5fdd69dda5c1746d01b1722bb333b2260914

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      93b333d106c142a1584808e808195194

      SHA1

      389e79abba567c09499a07d9579115b98fcb2fdb

      SHA256

      5ac4c283dcb172647554c310a3673cd62c9d530fa377d3762e069d9a71d0fcb3

      SHA512

      424c68368e6674df42d0b82692c8e49d58d2da2376f5ca616258ca99c519f5fa77febc5203cb5529027acae3aa5288ca8d697b015fa4bf08580d1126854f8bdb

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      3c875acd9f4420a061856c1fb3dd6d8c

      SHA1

      bec310bec2ec269ced606881e44b8e34cb4c5a10

      SHA256

      71041fbe4060b2da47b3812c2391f0146c866b832d77ff665320450dabda7c35

      SHA512

      4d8934b0e98d09adfba49cd8e6af14beaf74569a7e945c4e6e6acdc638469a2821fd2f5fa59d208a69da1a9e778e774ed23088bc35a8373bb8cde89941769c30

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      8166791ff70b8bf4a818796a3e39cfdd

      SHA1

      3d49e4bf6237d89c970f93c91555cb40032cc09b

      SHA256

      2c1f1c8cd8f6695bb5a46813304f7d5cbb40ad07f390bfdae3875f4855064d14

      SHA512

      916eeb3da7231180605f0313d08acd39c96d97f7f99f16f43cf32aee50311dd614d856b44a377caee7e15e1415f2ae282b9c4918111beeb4698f71dec993ce49

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      47ef98e70fff5c54b7a77c5e244cf1df

      SHA1

      161b8b079c7d8105e204d48665e8fb4f603aaa52

      SHA256

      4e98c4628dc0f65caaf38cd0673814f5d38d1a6031e1fddccc1c7291382f204c

      SHA512

      553fa5b14f1af9d915eae0a8ee3c470373423e5145bdd366e0c3f8b630416e4f6a14fb782d4fcb23142c5d0445be593be5cf25f5623f6ecc9f2d31811a273e2e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      33fb464f8ee5b1d5b5983a6b16fc6ac7

      SHA1

      ea4262b0e990c5bea9f919f1cc601a2edd723619

      SHA256

      28bec3dd78d6c5dd8dd69e9608458d021527e5f9b7fbfa7043ac35d926a1e34f

      SHA512

      372d774109335c7c63aaed16f216ecd85545a1a4dedddde3ddbe25fcae804f0c5f2734468dbed24cb4a3b951ab6768b7427f8ebf785ec5148b107e52db720c19

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      f31ffc6dfcb398ba0d185efcf6c8f799

      SHA1

      faef076e5f07423ce5d23213c32410d782cd01c3

      SHA256

      551db70675ce362bc9ffad443e2736b4753b0fe84d54505dc9d9672d768073cf

      SHA512

      c578782e7957fc4a5e256b4ec641ee7768f07ae01453f8d402b40843eb49826cf14c6a14683a9604c17943c6c027957fbfaa954c14ae1aac3c59dff2537cf9ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      913c4933739c9bec2e6ef733dc8c80f5

      SHA1

      d99f80d1eab8196e48696347ea3c8018d3abfa38

      SHA256

      6a74c8cff271aa48eed5509352e006ec9058e24de53c92576427506d869a1a48

      SHA512

      a87bbbae6a625f946c953996fd6ba6c423a8865b720f9e0789ff2d0b9f5129b53b7abddc7fe400500a4bced653c5d838a4087c11a0ce804c7f76856bbfd4ec14

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      342B

      MD5

      ef40196636f84a7bd5c2d0deee873879

      SHA1

      0117519829a57a444e676fae61873adeed97dc08

      SHA256

      bc17df32cff4ec33f3b2886aca7bc6f8788056c199b3cdb601f14ff6f1fec2b9

      SHA512

      6ddb35a65c1c822cfecee206814b588063fd375747a0d9693d5ec9f878a22d4cfb20ddc048f189fdae589821e0800a256d4364d1eef7a3437bf95ac132f7dbfc

    • C:\Users\Admin\AppData\Local\Temp\Cab2723.tmp

      Filesize

      70KB

      MD5

      49aebf8cbd62d92ac215b2923fb1b9f5

      SHA1

      1723be06719828dda65ad804298d0431f6aff976

      SHA256

      b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

      SHA512

      bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

    • C:\Users\Admin\AppData\Local\Temp\Tar2793.tmp

      Filesize

      181KB

      MD5

      4ea6026cf93ec6338144661bf1202cd1

      SHA1

      a1dec9044f750ad887935a01430bf49322fbdcb7

      SHA256

      8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

      SHA512

      6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

    • \Users\Admin\AppData\Local\Temp\SEFDFE.tmp

      Filesize

      1024B

      MD5

      12871388b682b159ddd85545302a289d

      SHA1

      76b47377da188fcfddeefa0f940287f1cce9885d

      SHA256

      cc033f00e96cae1829e3a5c15150fe68a62f65440f1b158d9257370fbc488a9b

      SHA512

      d60953b62d08e52fa2860db257e2bdbaa97e7eff7007617857f7b30a76f7c7ba81f8444d313a6ad496adbbaede5af1661e72522046789bb9aee1340f7ac12c7d

    • memory/2688-550-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-510-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-544-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-542-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-540-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-538-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-536-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-534-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-532-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-528-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-526-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-524-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-522-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-520-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-518-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-516-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-514-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-548-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-508-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-507-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-504-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-503-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-0-0x0000000000400000-0x000000000060E000-memory.dmp

      Filesize

      2.1MB

    • memory/2688-7580-0x0000000002F90000-0x000000000319E000-memory.dmp

      Filesize

      2.1MB

    • memory/2688-552-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-554-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-556-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-558-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-560-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-562-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-565-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-546-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-530-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-512-0x00000000029B0000-0x0000000002AC1000-memory.dmp

      Filesize

      1.1MB

    • memory/2688-1-0x0000000076BA0000-0x0000000076BE7000-memory.dmp

      Filesize

      284KB

    • memory/2688-8246-0x0000000000400000-0x000000000060E000-memory.dmp

      Filesize

      2.1MB