Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-11-2024 06:17

General

  • Target

    80f7768cbf016ae16f5758e31d9eb2d277c0566654f05bad152ecbde6eb616e5.exe

  • Size

    16.1MB

  • MD5

    91f7229586df2c577a54ad0d1a5bdcb1

  • SHA1

    938b4ddf983e035130a7fcbf0458c4f9d5b69ca5

  • SHA256

    80f7768cbf016ae16f5758e31d9eb2d277c0566654f05bad152ecbde6eb616e5

  • SHA512

    089ec05f751306b994eb1265245961c2f51b89679f4b70c08a0404fcfd7d6d6deec8133ee5f3f04e82d7272ec4c95bee3859fa9c74be0b96966c569fef258c0e

  • SSDEEP

    393216:PexFZAWTc+MZ3mOvSY6oDXtVVFOzWt8zLDVi:+AL+WmOvS9qDSzHzL0

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\80f7768cbf016ae16f5758e31d9eb2d277c0566654f05bad152ecbde6eb616e5.exe
    "C:\Users\Admin\AppData\Local\Temp\80f7768cbf016ae16f5758e31d9eb2d277c0566654f05bad152ecbde6eb616e5.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\is-28Q48.tmp\80f7768cbf016ae16f5758e31d9eb2d277c0566654f05bad152ecbde6eb616e5.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-28Q48.tmp\80f7768cbf016ae16f5758e31d9eb2d277c0566654f05bad152ecbde6eb616e5.tmp" /SL5="$4014E,13456411,1058304,C:\Users\Admin\AppData\Local\Temp\80f7768cbf016ae16f5758e31d9eb2d277c0566654f05bad152ecbde6eb616e5.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:804
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\Temp\is-8LCD7.tmp\cispn.ps1"
        3⤵
        • Drops file in System32 directory
        • Command and Scripting Interpreter: PowerShell
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2648

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Cisco\Cisco Secure Client\UI\csc_ui.exe

    Filesize

    2.9MB

    MD5

    24de4ed3ff1fa997f867b591be4e001d

    SHA1

    744d45ebd394880598b597d882ae2b634b9261fb

    SHA256

    7c4330c4bd0c6890c7efc49af493056b92332c65be2bf885cd2a599369ba5349

    SHA512

    8a32756cffcd10d6df5f0b6da917a203115431fe101b2b7746b1d8e76956b12f6af5ce89bce29bc505558943f4d661d45e2630b4b5790625b968549146ebec88

  • C:\Program Files (x86)\Cisco\Cisco Secure Client\UI\l10n\es-es\LC_MESSAGES\is-MN0OC.tmp

    Filesize

    346KB

    MD5

    9d4300c87c9e378a13efa9999d305929

    SHA1

    0a7bb44a99208085296e782fd2e7b22170e7d03a

    SHA256

    d92d3e91f1b4036435cc6e39e2ce048de7153a54577695313aca1119df70de82

    SHA512

    297d7848fb011d8e79a7ee1b48d42227fc8582848b9232f4ed155b5fa1476c25654885fbd39e0207dd86f619bfc0fde41a0d448365e5b1d57d7c359b7eae3b1f

  • C:\Users\Admin\AppData\Local\Temp\is-8LCD7.tmp\cispn.ps1

    Filesize

    2.9MB

    MD5

    2d47f35f6ec3abdfa6df92cb13bef294

    SHA1

    16e532caac6b7176369f5fa29a869ffa0def8947

    SHA256

    85c3c72a135ee57914d27c563e9ae31f417af72fa04ab2d3a09f10eb674455cb

    SHA512

    e6be961e4f384749f621e3b14f2b1468f3218480de3eeaa0c7a6448f70911fc942b30d1c135729edea9bd489c8b5f42fd255617a79428568df2a58f9d6c0e134

  • \Users\Admin\AppData\Local\Temp\is-28Q48.tmp\80f7768cbf016ae16f5758e31d9eb2d277c0566654f05bad152ecbde6eb616e5.tmp

    Filesize

    3.4MB

    MD5

    bfd84005e52425f9b8fe658b9663e1c4

    SHA1

    49c54a003678dc14a19ac5d07c9bf053b8cd0683

    SHA256

    2ea785b8a4cf5c5fc457350a4c636dac40137269a1a93d24c1083f1f77324d5d

    SHA512

    3e4e2a32f50c6bb200af8a37c8653ef55e6d8ff47042266181546fd1ccf125a4fd5d2b7d8801d9179bf5e899c4992092895ee6f0d3f4e11ac8d5a1f40e5f82bf

  • memory/804-8-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/804-12-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/804-11-0x00000000003E0000-0x0000000000750000-memory.dmp

    Filesize

    3.4MB

  • memory/804-14-0x00000000003E0000-0x0000000000750000-memory.dmp

    Filesize

    3.4MB

  • memory/804-16-0x00000000003E0000-0x0000000000750000-memory.dmp

    Filesize

    3.4MB

  • memory/804-541-0x00000000003E0000-0x0000000000750000-memory.dmp

    Filesize

    3.4MB

  • memory/2528-10-0x00000000009C0000-0x0000000000AD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2528-0-0x00000000009C0000-0x0000000000AD0000-memory.dmp

    Filesize

    1.1MB

  • memory/2528-2-0x00000000009C1000-0x0000000000A69000-memory.dmp

    Filesize

    672KB

  • memory/2528-542-0x00000000009C0000-0x0000000000AD0000-memory.dmp

    Filesize

    1.1MB