Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    31-10-2024 08:10

General

  • Target

    9e7b9cec2792e7e3efd7ae08328a64a79427d4be79210d1529fd146a2dc76f96.exe

  • Size

    76KB

  • MD5

    74f4d3c1b88440eb332154535d6ddbd6

  • SHA1

    5a840497bbf0809d158a9937f5de1c9bf8bca4b0

  • SHA256

    9e7b9cec2792e7e3efd7ae08328a64a79427d4be79210d1529fd146a2dc76f96

  • SHA512

    38d45ce90bfdd9c7bb86e4d5e89760a23b3a628c528855b7925b4fd3ff5adbc7c0220a9134d54dea37d1865e9d28c89a9ae68c3b33618a4e32dd4026083905e3

  • SSDEEP

    768:agO5xRYi+SfSWHHNvvG5bnl/NqNwsKVDstHxYD0p1aXKynF0vQmYZS0HdJnfWO04:RshfSWHHNvoLqNwDDGw02eQmh0HjWO04

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 5 IoCs
  • Drops file in System32 directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9e7b9cec2792e7e3efd7ae08328a64a79427d4be79210d1529fd146a2dc76f96.exe
    "C:\Users\Admin\AppData\Local\Temp\9e7b9cec2792e7e3efd7ae08328a64a79427d4be79210d1529fd146a2dc76f96.exe"
    1⤵
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2840
    • C:\Windows\system\rundll32.exe
      C:\Windows\system\rundll32.exe
      2⤵
      • Executes dropped EXE
      • Modifies system executable filetype association
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      PID:2528

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\notepad¢¬.exe

    Filesize

    82KB

    MD5

    54f78dfdcd0f0d75b954e79d6c3e8d67

    SHA1

    d73f8431c370182093e4facfa2a05f7118e99cb2

    SHA256

    9d09571dde1158b23594e345fe6a26fec88396fb74325b88edfb42759f040d8e

    SHA512

    a45d1550d7aeb04d473eb51dddd1e2a55c24557f2cadff660a5b08109ef05196691efe24c36846219038c68dfe6f95907b0853cdee6ef0659fe78aa0791e495c

  • \Windows\system\rundll32.exe

    Filesize

    80KB

    MD5

    6b856ef6d53588256e31aa6e8fc04b24

    SHA1

    9829c52374f9d218f6e584f7d37575ed6fa9b634

    SHA256

    d57aadf496f24488bf82220b8eef6c2feff9e9a04d01528fba3221077abd9559

    SHA512

    548ce68f5f0256e2cc29cd20197230c844e4c3ef25582dc2cc0c1a25807ed6eb1ec345b5596d6c74ae3818068867edf36e63855729fbb27ce9b298699296e5d2

  • memory/2528-19-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2528-23-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2840-0-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2840-11-0x0000000000270000-0x0000000000286000-memory.dmp

    Filesize

    88KB

  • memory/2840-17-0x0000000000270000-0x0000000000286000-memory.dmp

    Filesize

    88KB

  • memory/2840-21-0x0000000000400000-0x0000000000415A00-memory.dmp

    Filesize

    86KB

  • memory/2840-22-0x0000000000270000-0x0000000000272000-memory.dmp

    Filesize

    8KB