Analysis

  • max time kernel
    57s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-10-2024 20:55

General

  • Target

    TMACv6.0.7_Setup.exe

  • Size

    5.1MB

  • MD5

    a7c8cf1d50ebe630a7d0c47686a0abbf

  • SHA1

    3229e8080975f4f5512d2382552f68c0389acff5

  • SHA256

    a453b3ea8d8133531fad26b18701c694c324cc201e3069d07e99f0e100908c1a

  • SHA512

    42340b7435605049e3f817feac1ac238177772b2b1ebf05eb9311bb58ee3dd1cab39913240a4c39e3407374009310770d8221c31914549524ecd92beab93b787

  • SSDEEP

    98304:ARU3j4wtopcj2dqCYV1coZ4hv3tmF1b6CrjfW/sfH6s7zQcKDsVv/JLSF66b/:ARqt/CdqRc64hv3tmF1b6CffW/sfH6sm

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 6 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TMACv6.0.7_Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\TMACv6.0.7_Setup.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s "C:\Windows\system32\COMDLG32.OCX"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2992
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s "C:\Windows\system32\MSCHRT20.OCX"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2736
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s "C:\Windows\system32\TABCTL32.OCX"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2508

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Technitium\TMACv6.0\Installer.exe

    Filesize

    189KB

    MD5

    d7130a88660d4e29bbe7ed994e9529e9

    SHA1

    78c6720f3be088a1c563d7a888202617e9e373ef

    SHA256

    cbefffcacd8c34b244a6e10c3b72ccbe866ae6aa2da3496a6cc630c372d0ee25

    SHA512

    c99bbe2c0a615acf61c204844eab5c6fd7fe8f983be7ad3c4b57dad29ebce11e93d928ad037abea1bf0484f4be7bfe95c27b1e9dff789e9aa60f8b0c0e9e5ce1

  • C:\Windows\SysWOW64\MSCHRT20.OCX

    Filesize

    987KB

    MD5

    38ce0c8fcd78d00fd717ce3a91214cbc

    SHA1

    953b182806a8ddcde48b033537e3432a56d1cf39

    SHA256

    de49eb9f935416cc57a1b590cca686e4a14e7b3cbbde10b8ff7fb88642a215ce

    SHA512

    bd7c0319953c5280d1e0f961cd6324c70c4949c0db0aa1cd77c27a8a1abfd6e592164a8888e3a06b5b127614d9b9caf1dfcae95b9e50216547a8e8ffb1f00006

  • \Program Files (x86)\Technitium\TMACv6.0\Installer.exe

    Filesize

    184KB

    MD5

    1a56af5a19362ff83b99eda81f5dfdf9

    SHA1

    1282d21a54255a49b8b4d1b9b442a7d1d56bfca6

    SHA256

    72367e11dbf5e3ad9fa1cc4b2fbd3d8e3e5a26d5683cfc7b06b7d1ac33aa4011

    SHA512

    bfd138a0a25cbf3869ebc0fe0de7ef6b60425bfde536008ecacf7c3e6b5925a66c80734cf989056c2d36b240ceae4e447762d48dcc9ca866bd51cabf1c2cf0aa

  • \Program Files (x86)\Technitium\TMACv6.0\TMAC.exe

    Filesize

    712KB

    MD5

    230b4c45774e95dd75241068c68aeb0d

    SHA1

    ef46dd76a8c6d4a7d6882469015a07a9bf660a50

    SHA256

    6c3d76c9a4d1652ce25ae8c2ba1907167cfaa0054b8e1325f370c52eafa74c97

    SHA512

    fc08d219e1023d7929250ecab81f640e4114f51b184d9004da0887c93b24a6026931a71da4ef0e95caa2a416d858496b5e174bcd0dd3bd3a76bca6582283e90c

  • \Windows\SysWOW64\COMDLG32.OCX

    Filesize

    137KB

    MD5

    b73809a916e6d7c1ae56f182a2e8f7e2

    SHA1

    34e4213d8bf0e150d3f50ae0bd3f5b328e1105f5

    SHA256

    64c6ee999562961d11af130254ad3ffd24bb725d3c18e7877f9fd362f4936195

    SHA512

    26c28cb6c7e1b47425403ab8850a765ac420dd6474327ce8469376219c830ab46218383d15a73c9ea3a23fc6b5f392ee6e2a1632a1bf644b1bd1a05a4729e333

  • \Windows\SysWOW64\TABCTL32.OCX

    Filesize

    218KB

    MD5

    dc925b6d77ba9ecb532e2f6750be943b

    SHA1

    f71215e701401f0dd6fe143e3a630b2e168a4fac

    SHA256

    d10a197fd53e65dc910ca4aed86cb674c613ff14ce6436d1a445bb27a7a499e0

    SHA512

    ee9c40e695a29de7e7b8a9fe1ca01ebba9a8bdc199d46d98c71a4e3ecfec566f2fc31300a5e9867e8c791b15ac3ebec076f0710e0f6eec6c3fdea3bde37ab171