Analysis

  • max time kernel
    119s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28-10-2024 16:04

General

  • Target

    Proxy_Tools_and_Grabbers.rar

  • Size

    137.3MB

  • MD5

    0325df826cf44b475b70c8244cec2947

  • SHA1

    125f6731a9b6f09eb66b4c02095d2090d70df1da

  • SHA256

    1ec294c1fb059743f946ed9cdd9949d45a724db845ad8af8ac46f35d13c09e73

  • SHA512

    d60acc19f26df90bbf1ba0f91dc24022f7fe73d952a137b9aa07f76a2d45e1498ddeaf3d9f365a201e29aa619247cebadd87c0054e0d288a2ea169e4f6296dac

  • SSDEEP

    3145728:pqGX7Lf3D39l2pp9TCW8aZiQ+nc321i0EHTQD8XBD:7T39l24WGi0EHTQiD

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Proxy_Tools_and_Grabbers.rar"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Users\Admin\AppData\Local\Temp\7zO003F17D6\HQ Proxy Leecher.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO003F17D6\HQ Proxy Leecher.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2256
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zO0038D7F6\version.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:2888
    • C:\Users\Admin\AppData\Local\Temp\7zO00357327\ExpressVPN Brute Checker By ACTEAM.exe
      "C:\Users\Admin\AppData\Local\Temp\7zO00357327\ExpressVPN Brute Checker By ACTEAM.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zO00357327\ExpressVPN Brute Checker By ACTEAM.exe

    Filesize

    80KB

    MD5

    67c53c8cf5faff4da38063cd7de832b3

    SHA1

    0df706d85d02f359752d8ef4ac3cef232f131264

    SHA256

    3b39172bf247c3c298c9f7a675d11faafb5919e18ecab0a6e7a640332baf9f71

    SHA512

    0fc77fa0c2a6fb8507dfb82e1ec5ae80d92e9492395b0b0283b8d9f46f14f464523732b0c35b19f262d40ee466344b5bef7efe737ea66a085575bf62e9abac2a

  • C:\Users\Admin\AppData\Local\Temp\7zO0038D7F6\version.txt

    Filesize

    1KB

    MD5

    209dca7db9d69e5ee8e06af6d2e37c8f

    SHA1

    9bab15b00bf282c5a83960db7f74fe262804a322

    SHA256

    064fd2938925512d0aa2b0b4e1eec6439bb7126ae5689060c43f19da13b756a8

    SHA512

    c099287ea3c285463eff41f2fc79ec5d1e7e4769508321524647162bca643b8a6b0d2a6e16dee2a88974cba016a4b0a3173756f00cba8325f596f842e95a717b

  • C:\Users\Admin\AppData\Local\Temp\7zO003F17D6\HQ Proxy Leecher.exe

    Filesize

    226KB

    MD5

    a44575beebb1b1b4137f2c98e81c3207

    SHA1

    771192f3b1be573ae54fad098b1ffed055b352e5

    SHA256

    edd0c7c8fc5839792e878098dc5f171ee45b5fa726e50bf612213274f3aa3b21

    SHA512

    d7d3b1d8b36f29a604063a5196c0d7e609db801030e21c69cb1d0a77ff798d99bbac48346a412146877f82c4536bf4cca5185da4bd92de93687346e7d3b8b309

  • memory/2256-12-0x00000000008F0000-0x000000000092E000-memory.dmp

    Filesize

    248KB

  • memory/2892-27-0x0000000000D40000-0x0000000000D5A000-memory.dmp

    Filesize

    104KB