Analysis

  • max time kernel
    110s
  • max time network
    86s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-11-2024 17:27

General

  • Target

    605cbd2c44e0f04716b233626c31907a8a3a451e25a9dc2e6b8939b3ee82f482N.exe

  • Size

    860KB

  • MD5

    a8a491947c74a7dfb9f00bca59a243e0

  • SHA1

    d951464e7c0ec23617fb35f5ae622850f6a3e5d1

  • SHA256

    605cbd2c44e0f04716b233626c31907a8a3a451e25a9dc2e6b8939b3ee82f482

  • SHA512

    b1c0b2248605b6e2195dac08173af551541dd50bbd86209450c6f2cfad6b7ad87ca3116cf95aadf5834f8d6a67a8caa53c905c1586be1d752b2b840bad2c974d

  • SSDEEP

    24576:2LADaJYo8sYH4LaWhOIPqd5x43NXzofQWMSnmwrAtF19w6AYhqp:2ipTMSnU

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Deletes itself 1 IoCs
  • Drops startup file 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 32 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\605cbd2c44e0f04716b233626c31907a8a3a451e25a9dc2e6b8939b3ee82f482N.exe
    "C:\Users\Admin\AppData\Local\Temp\605cbd2c44e0f04716b233626c31907a8a3a451e25a9dc2e6b8939b3ee82f482N.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\yop95b71cd8447cde0b45bd9c3\vyr8ba3215.bat
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:876
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall delete allowedprogram program="C:\Users\Admin\AppData\Local\Temp\605cbd2c44e0f04716b233626c31907a8a3a451e25a9dc2e6b8939b3ee82f482N.exe" profile=All
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:2552
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\yop95b71cd8447cde0b45bd9c3\xprf3e1fef6123ad.bat
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2432
      • C:\Windows\SysWOW64\netsh.exe
        netsh.exe firewall add allowedprogram PROGRAM="C:\Users\Admin\AppData\Local\Temp\605cbd2c44e0f04716b233626c31907a8a3a451e25a9dc2e6b8939b3ee82f482N.exe" NAME="Session Win32" MODE=ENABLE PROFILE=ALL
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:2012
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\yop95b71cd8447cde0b45bd9c3\unn534ab1f149e6295f3f5e.bat
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2356
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall delete allowedprogram program="C:\Users\Admin\AppData\Local\Temp\605cbd2c44e0f04716b233626c31907a8a3a451e25a9dc2e6b8939b3ee82f482N.exe" profile=All
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:1564
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\yop95b71cd8447cde0b45bd9c3\vyx83fce6cb2b0ad5f4ce49391.bat
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2984
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Users\Admin\AppData\Local\Temp\yop95b71cd8447cde0b45bd9c3\vroc59fc56b.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      PID:2108

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Cab40AA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar4197.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Users\Admin\AppData\Local\Temp\config\exitd.vxd

    Filesize

    1B

    MD5

    5058f1af8388633f609cadb75a75dc9d

    SHA1

    3a52ce780950d4d969792a2559cd519d7ee8c727

    SHA256

    cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8

    SHA512

    0b61241d7c17bcbb1baee7094d14b7c451efecc7ffcbd92598a0f13d313cc9ebc2a07e61f007baf58fbf94ff9a8695bdd5cae7ce03bbf1e94e93613a00f25f21

  • C:\Users\Admin\AppData\Local\Temp\yop95b71cd8447cde0b45bd9c3\unn534ab1f149e6295f3f5e.bat

    Filesize

    264B

    MD5

    1938ee2ea4ef6892278b486874406dbd

    SHA1

    ebb0c6567f60a9927b40c1481aa83e889ba61f6b

    SHA256

    e5f96d96a0c4d7c6ebaeedee6c37d1bb87ace6c9278af208754f1cba243a23f2

    SHA512

    9b12d4ff5f34e44463c40a41b2af6ce167ebf8f7b1e187f130f3970678534e6fab9c2dfd781413d6f3c4152bf5cdbba378d40f35a250da3e739fcc119ac46f13

  • C:\Users\Admin\AppData\Local\Temp\yop95b71cd8447cde0b45bd9c3\vroc59fc56b.bat

    Filesize

    1KB

    MD5

    3217c951af743a8f68ebc27adbf99dd0

    SHA1

    f907f09af2cb10ca4b9772e698a5af08f2107ab8

    SHA256

    54d46637c11036ef423d373cdd313fa178b09ce1fe2833c918e3d15125f6aae1

    SHA512

    230b205cd4c8820ebd562bacc47f3988005661ea9eb3a08b75733b17e62894e3dc98a86897c92f8e370be1d5bacf04111b03c7e751cf2ba88f61550b7e588258

  • C:\Users\Admin\AppData\Local\Temp\yop95b71cd8447cde0b45bd9c3\vyr8ba3215.bat

    Filesize

    251B

    MD5

    94341a777884df4e27b8166a79bd617a

    SHA1

    0e1b0fef089b60a726367981f2a94cf28a8436bc

    SHA256

    606a5f91a9c1af93a3ccc5705e8e81eb60d1b19f8272c46cbfb42eef5c8cfbcc

    SHA512

    8fef24325977d1c972b629a8865d6770bb629ba93d4ba61d429c2fb53473ab79d8241fc8bd1af818f0bab2224f7d870f20e8a0c6d82569086fa2c28cda4d1769

  • C:\Users\Admin\AppData\Local\Temp\yop95b71cd8447cde0b45bd9c3\vyx83fce6cb2b0ad5f4ce49391.bat

    Filesize

    300B

    MD5

    2d03ac42d69f14fc1b1aaebba60f9616

    SHA1

    018eb39958ce51de660bbdfdd3e16f35b5b2a8a6

    SHA256

    e50ddc260ffb7f94a8d6fa07e9d074ec60ee8b51145c6fb44bef74f9d1058e7a

    SHA512

    df48643020b1c12c0c4b6fcf20420451af353b788311eb38040a8d6cbfd774638d6752984785bae296a1434b1c4e50f811b1dd165b0989a538842586d301d820

  • C:\Users\Admin\AppData\Local\Temp\yop95b71cd8447cde0b45bd9c3\xprf3e1fef6123ad.bat

    Filesize

    291B

    MD5

    69fced56c306b9ffab652dfcd9d64498

    SHA1

    35247a8c63776ce484a5297064da78a4e7106eea

    SHA256

    b30a1fa6e62430ef52bf8d8bcbfde08cd8cfc1895ecdf6d6024c4daa70684e49

    SHA512

    2d471fee9313c462aa29b2e7f863bf1a54935ddc666bbefc4dc5c20046851273c8a4a51870e5388f595e474367bb2290e8651a935476bf3003f0e3296c80a017

  • C:\Users\Admin\vpsafe25e81c90a0bf666638ca\605cbd2c44e0f04716b233626c31907a8a3a451e25a9dc2e6b8939b3ee82f482N.exe

    Filesize

    860KB

    MD5

    6d0147e292dbc13c7d30328fd14f06bd

    SHA1

    2efd9af6fb66596fb47ba9c280877e6441b5438c

    SHA256

    2184ede0e3825b17529be43987584aa8f01ed68cfa8fbe273044e39d60131d68

    SHA512

    30fdf10aa34b55e62bdca9ed6fc0b84aaba8c4e0396de599ab46aa793b5dc9a4370a3b40fb018ab0b9d1fd2bb17224eafe78a58dd7c662ae38077a72df7d2fb2

  • C:\Users\Admin\vpsafe25e81c90a0bf666638ca\config\configure

    Filesize

    20B

    MD5

    b375c2aa338352d53c2924d8bc47fd1e

    SHA1

    6454e10a2b3be9efd46302784ee9ca7c832a0ccf

    SHA256

    ac74eca14a434c431d0c5fe5da5331dc2868c87fa5fd7ff8fb940f60d608ca31

    SHA512

    f04731b22c19dd930f94a8df86cf28f0acf48651034fd568fa75509134674c35e5f0a0371193272daa4f76a37cbe079cfccab93f15b23253f468f882274deb84

  • C:\Users\Admin\vpsafe25e81c90a0bf666638ca\config\name.drv

    Filesize

    24B

    MD5

    9aeb7158521b28efb887e75c02aa4fea

    SHA1

    63992e4ab8c7806c1c142df8bd66d3a4c7d551be

    SHA256

    4b30fd3ba7398a84eb9aafe0a9d37625e2e4047758d3085fb7fc8117ed8dcc10

    SHA512

    ae025e42c598444665a08df5ce8dfba5298317f966a683f39afa4e4de86908755e324e6aa15cc7cf9ef9de04c7192d6d3bdea8e60925c98f08bbfdd4602a0749

  • C:\Users\Admin\vpsafe25e81c90a0bf666638ca\config\script.txt

    Filesize

    610B

    MD5

    7789e3e782fe4d1baefb3a39fcbba03b

    SHA1

    7c8f1204eddc6997cc3ce4f9bfff477b6716ac19

    SHA256

    ecf36498860fcc69a2dd2a1164f5973cbfd48fd8d9708cb3e4c99b52d806936f

    SHA512

    fe77c4678cc6f828e3fe4a5204d248d7a5d122da088b224ba7d26b3ac9547c131120a02ba662d0d453cea98f43feae6f008cf6279b1914e84aab0f61f8614c81

  • C:\Users\Admin\vpsafe25e81c90a0bf666638ca\config\update.txt

    Filesize

    1KB

    MD5

    78962aa5a060a2aef9141bd2d2700af2

    SHA1

    1646eb7823628d12e6ae6d52c3f572d66290254c

    SHA256

    b93f2aa97da9190e64e057caae3174191a0423f6693d312437a238f9a1e23547

    SHA512

    87e2038876368cee92ed0d96369f18d53c70548986218aa4add83bde6e4ba40296203d18d6944279fcab9e97aa2235b7f1e6e1ccdb43bc6d458648abb6f536ab