Analysis

  • max time kernel
    119s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    17-10-2024 15:24

General

  • Target

    19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe

  • Size

    78KB

  • MD5

    6e4a9ddee87ef37ddb541436b6616950

  • SHA1

    03fa8dbfe85a08bda3704ace8c4231dc76401fa6

  • SHA256

    19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037

  • SHA512

    b23532537c79589c8f62516253eeffaff340ef3855e697ec5c93ba3f89d639b7cf4c8b9b2fc290935d045b49c8e32753cfe0e69638f3cb5bd3b1dbffcf4385fa

  • SSDEEP

    1536:MTy5jpAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qti6C9/61QM:cy5jpAtWDDILJLovbicqOq3o+nq9/y

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe
    "C:\Users\Admin\AppData\Local\Temp\19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\_8krr-lf.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2200
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES39D6.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc39D5.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2860
    • C:\Users\Admin\AppData\Local\Temp\tmp35EF.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp35EF.tmp.exe" C:\Users\Admin\AppData\Local\Temp\19ba4b537d62ae3c977d29debec50de74275787963004138276593d5237c3037N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES39D6.tmp

    Filesize

    1KB

    MD5

    aa19311022aaa94b05f8bfa7e5891393

    SHA1

    8af5f3f0831558d2cd86804f36d400898f4450a1

    SHA256

    d40f56bf701405f356c4ebedbf446315678d3227d5d3975e5a80b3a92d5ca585

    SHA512

    bb1896926fc8bd1eb6c53055432e04ae2cc67aef970092e357818931d238b84f25bebb6da23ba66e263f5af5f3652b8a18c0f689fac54149fec3cea9a98d46b0

  • C:\Users\Admin\AppData\Local\Temp\_8krr-lf.0.vb

    Filesize

    14KB

    MD5

    61055188cafaa05f0a6566d2c6a44419

    SHA1

    bd6d5031a13cbe6bd65bd8dc4925a6043decf143

    SHA256

    b91316587de0dc2197dc8a763766e7927fc69d53f1aa4b8b82b05c59e3f7b33b

    SHA512

    1a0935e891e0d55615611c6515970911487d93635f4a83b793484a0ba5ec678cad9f67f821f5dc86c331b99293717887e1e3b1bc25f0f38bae53c81f69d7bef7

  • C:\Users\Admin\AppData\Local\Temp\_8krr-lf.cmdline

    Filesize

    266B

    MD5

    a7ddeac40fbc1e1086b2423c079e32bc

    SHA1

    61cc549208a2449edf32f1c67a2398ff53f60271

    SHA256

    4ec83549e5bc907d37d5c4c6c94a82497f110de9d28c0bc7c4f4706a948090e5

    SHA512

    cf5b46b3aba0461469343cb1a5eddcb23131474bb5ae96ccfc1c2884359bd7987a530fae5e8b79e39c454d5116c06281f13a5ad2c9966ed5f1c777c0f3795947

  • C:\Users\Admin\AppData\Local\Temp\tmp35EF.tmp.exe

    Filesize

    78KB

    MD5

    ef7cb4949a54604bd416ab33730eb027

    SHA1

    0fa963d7d2d54d64ae833888d19b605dd967a850

    SHA256

    ccae7048207a18a57f05aa338eb8433c47502bf4d7ca7291eb47ed9d895aeef7

    SHA512

    65fcc0d245fa616e8dc9c52bbcbd1af06f878c893ffe6a658d1f68ed00051aa7e3459f9ea8dbc71cce7538a82e79f868709ba5a243c70ad0618831e19309da93

  • C:\Users\Admin\AppData\Local\Temp\vbc39D5.tmp

    Filesize

    660B

    MD5

    65155d37472e8295fb4b046cfda0a5bd

    SHA1

    db01f527e9d7c3ac609b1f0d7f8e709e795d18ad

    SHA256

    a192ddd5ee1900c641a103a68d1eeca79fc3a2d2d451d97b3ce061885263d74f

    SHA512

    f56b7639957b9c564b47f581fbdb84aadad640fa38e4a7a190c2e6f8537f7f5c36e456b9310544df5665f503dc2132a60f01209365267e4b46b1d8f82a9f87e2

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    a26b0f78faa3881bb6307a944b096e91

    SHA1

    42b01830723bf07d14f3086fa83c4f74f5649368

    SHA256

    b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5

    SHA512

    a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c

  • memory/2200-8-0x0000000073E50000-0x00000000743FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2200-18-0x0000000073E50000-0x00000000743FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2536-0-0x0000000073E51000-0x0000000073E52000-memory.dmp

    Filesize

    4KB

  • memory/2536-1-0x0000000073E50000-0x00000000743FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2536-2-0x0000000073E50000-0x00000000743FB000-memory.dmp

    Filesize

    5.7MB

  • memory/2536-24-0x0000000073E50000-0x00000000743FB000-memory.dmp

    Filesize

    5.7MB