Analysis

  • max time kernel
    54s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2024 19:02

General

  • Target

    bf3f9f7cb3638c465309ee5774d90124a95b690990326a031b27e23da5bd2197.exe

  • Size

    627KB

  • MD5

    5c3f03999f591fcb1b19e3411d4d7b35

  • SHA1

    df980b7327f6a9a6ce340b8df1877830808083e7

  • SHA256

    bf3f9f7cb3638c465309ee5774d90124a95b690990326a031b27e23da5bd2197

  • SHA512

    727a890db934c38cfb65dad1a5abc24f2af1d6f4a190349d17272df6d3c33b765c726a388e83881740bc14e19a3e31be4ae571ac6be4403111a3703b4a027890

  • SSDEEP

    6144:fBDHmrz4niNy8o3Zp/TWt+g4RQTDUBO8/2vh+ziDV8m56TBac2GuO:5DHmoniNy8L8g4RgoBO8/2vhDX56TP

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bf3f9f7cb3638c465309ee5774d90124a95b690990326a031b27e23da5bd2197.exe
    "C:\Users\Admin\AppData\Local\Temp\bf3f9f7cb3638c465309ee5774d90124a95b690990326a031b27e23da5bd2197.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Windows\DBSever0.EXE
      C:\Windows\DBSever0.EXE
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2316
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\Temp0.bat" "
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Temp0.bat

    Filesize

    302B

    MD5

    3a9be52c031ef888e41e58806b2e0367

    SHA1

    ae9cae9138824e4157ce96dd47a3e27b4610204f

    SHA256

    87cb3a13a1a178c1435846891df1ebaa2f9249b498b8ae3f86fd9529eafe0b69

    SHA512

    b2b55088053483045209bbdb449a18b0f0b6215c19e9b2a05a303d369ad21651276c2f1b4b3921f4528e7670a76f62bb5484b39488189212286569cb7fafa9df

  • C:\Windows\DBSever0.EXE

    Filesize

    632KB

    MD5

    bf7b260d26aefeca796e2f2f60e072a1

    SHA1

    6426e3c21c95a005ff03de27e3d255577c81bfb1

    SHA256

    1a8fefb54fe1ba56f7d0ac6a7ed3c6ca61eeae17195310362f8c0df4d623f482

    SHA512

    f1761dbaaa59f02612ad4fc284e8aca3a3a0e307c3f04d35e6a510c723c4f8cb57ec99031d9677362c37d469bb713c60c45e1b2a367e246a025f983a918e0878

  • memory/1064-13-0x0000000010000000-0x0000000010073000-memory.dmp

    Filesize

    460KB

  • memory/2316-15-0x0000000010000000-0x0000000010073000-memory.dmp

    Filesize

    460KB

  • memory/2316-17-0x0000000010000000-0x0000000010073000-memory.dmp

    Filesize

    460KB