Analysis

  • max time kernel
    84s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    15-10-2024 06:52

General

  • Target

    c43e203dfc4284505a119df6a230cf04da79e40541fa0796367128f72c140996N.exe

  • Size

    207KB

  • MD5

    3200d276e79328dc4215b482566cc4d0

  • SHA1

    678d6bdd77ab682ab23a8e081040acd46253d28e

  • SHA256

    c43e203dfc4284505a119df6a230cf04da79e40541fa0796367128f72c140996

  • SHA512

    8be0d02f8a2a3939760f30d547dce67256d23a6a94fc908ae989f88bc9e095e2314c59d41e14359732c064fc9ffb2f3e06e617c4817f3e2bc55d5289324c030e

  • SSDEEP

    3072:mY22D32pxiCbv7xo9sAUcf6yidUr/61Z1ILrZXTXkS2jbxWGqt:L2g4iCXxo9sAURDdK6L1ILljXkSbGq

Malware Config

Signatures

  • Modifies security service 2 TTPs 4 IoCs
  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Executes dropped EXE 2 IoCs
  • Unexpected DNS network traffic destination 9 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 18 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 6 IoCs
  • NTFS ADS 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of UnmapMainImage 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\services.exe
    C:\Windows\system32\services.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    PID:480
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Executes dropped EXE
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1188
    • C:\Users\Admin\AppData\Local\Temp\c43e203dfc4284505a119df6a230cf04da79e40541fa0796367128f72c140996N.exe
      "C:\Users\Admin\AppData\Local\Temp\c43e203dfc4284505a119df6a230cf04da79e40541fa0796367128f72c140996N.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:2096
      • C:\Users\Admin\AppData\Local\Temp\c43e203dfc4284505a119df6a230cf04da79e40541fa0796367128f72c140996N.exe
        "C:\Users\Admin\AppData\Local\Temp\c43e203dfc4284505a119df6a230cf04da79e40541fa0796367128f72c140996N.exe"
        3⤵
        • Modifies security service
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Modifies registry class
        • NTFS ADS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: RenamesItself
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of UnmapMainImage
        • Suspicious use of WriteProcessMemory
        PID:2484

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-18\$d42efe3c20f7caa195f648ba935092c5\@

    Filesize

    2KB

    MD5

    ed0337436c4db7243d5a080fd60f2e93

    SHA1

    639e6b7daa4858e49053e0425051c9442909eb5d

    SHA256

    1dd09c7ff897a653b77072e5241649d67f0cfbc222fe4864a1ea24e775c23c1a

    SHA512

    5977375a4904a444e00cb11aa9dc03c6f7ab4678b99e8d0fe3ab908f07f0e540c67a33b05b4990e1d24d3096bd0c9bd01daff872b8d34ba3a2fb2f4d0a0df243

  • C:\$Recycle.Bin\S-1-5-21-3533259084-2542256011-65585152-1000\$d42efe3c20f7caa195f648ba935092c5\n

    Filesize

    25KB

    MD5

    9e0cd37b6d0809cf7d5fa5b521538d0d

    SHA1

    411ffdbe6c151dbd417bc59fa9dfec22b0adc9f2

    SHA256

    55d9748f0556576a8d522cf4b8dcfc9717436adcc487d49b3320770432960db2

    SHA512

    b511ee744dbe6cf0f54cb840d3786e89161115d0038425dde86d57752f76cae7a05f020120b43dc1444bd914c8c1690049e456635cc794fbf90e26794587dfc5

  • memory/480-31-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/480-24-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/1188-17-0x00000000029F0000-0x00000000029F1000-memory.dmp

    Filesize

    4KB

  • memory/1188-15-0x00000000029F0000-0x00000000029F1000-memory.dmp

    Filesize

    4KB

  • memory/1188-29-0x00000000029F0000-0x00000000029F1000-memory.dmp

    Filesize

    4KB

  • memory/2096-28-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2096-2-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2096-3-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2096-1-0x0000000000260000-0x000000000028B000-memory.dmp

    Filesize

    172KB

  • memory/2096-37-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/2484-18-0x0000000074A30000-0x0000000074A4E000-memory.dmp

    Filesize

    120KB

  • memory/2484-11-0x0000000074A30000-0x0000000074A4E000-memory.dmp

    Filesize

    120KB

  • memory/2484-20-0x0000000074A30000-0x0000000074A4E000-memory.dmp

    Filesize

    120KB

  • memory/2484-7-0x0000000074A30000-0x0000000074A4E000-memory.dmp

    Filesize

    120KB

  • memory/2484-10-0x0000000074A30000-0x0000000074A4E000-memory.dmp

    Filesize

    120KB

  • memory/2484-12-0x0000000001ED0000-0x0000000001F0B000-memory.dmp

    Filesize

    236KB

  • memory/2484-36-0x0000000074A30000-0x0000000074A88000-memory.dmp

    Filesize

    352KB