Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-11-2024 14:53

General

  • Target

    6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe

  • Size

    1.0MB

  • MD5

    5097fe796d4bca99a3d79998c27116cd

  • SHA1

    2e78d6968f547a5d70e5795ce89cbd51a06a90fa

  • SHA256

    6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f

  • SHA512

    d5c8c470c6496e4bc0fc1781f59cbd19f7a96d8cc98d3a5a5956123761bac1f7a635db3b908050652cb42a7ee2f0cd924cb5809239291d5ac3b5c2d723389180

  • SSDEEP

    24576:hN/BUBb+tYjBFHNhz6FI9Dh7WinTX1zJ54D+q0lPBzkFy:jpUlRhPzna4X1zJ5w+JPBAy

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 8 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe
    "C:\Users\Admin\AppData\Local\Temp\6c13b65c7ffaef21388c60cc2be3370b35a729eb9e8986ce1abd3303e144896f.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:264
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\rwwk.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /release
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /release
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers network information
          PID:2580
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c gbkusncub.ppt hcmdvu.msc
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\gbkusncub.ppt
          gbkusncub.ppt hcmdvu.msc
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2588
          • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
            5⤵
            • Executes dropped EXE
            PID:2940
          • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
            5⤵
            • Executes dropped EXE
            PID:2912
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /renew
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1852
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /renew
          4⤵
          • System Location Discovery: System Language Discovery
          • Gathers network information
          PID:1188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\chkblaxft.docx

    Filesize

    522B

    MD5

    e51ef2d4160c0f41b42ea8f38dedaa45

    SHA1

    aca488c15e88ad25e089eb374b6c1ead4c800e68

    SHA256

    4b7eabb2302fec9292a5aeb5949d54c0744c57de6cc527fb285441d29fae3c24

    SHA512

    4bf85824b9f0447e175fef3a731a514df19470b45611df683d6aafb5844d1dd23512ef092480ff715978c4e27df129cea355493fa56d2407a24dc3b993b403e0

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cucii.ppt

    Filesize

    562B

    MD5

    0a597abaa9895b8a6e2a1e01c1d2e207

    SHA1

    f37d888d098be4d11e5c170fb8e1e7470d91290c

    SHA256

    9d7b071af5a275c98a994d56ee211e646c8aa2cba39fb37fa20d78f73179552f

    SHA512

    9686f6182a3946c9013ea0b0147cc0ead5ecbe529645e6e70faf5779acb72f48849e9cae7c2519fd497a169d9b7a7f2acef990a85401727c42ce4a6994703b2b

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dddrmcvn.das

    Filesize

    511B

    MD5

    685b8082e059988e8f569a7c957d67cc

    SHA1

    6402355c5a4a7514a39fee6ee37c46902a4efc24

    SHA256

    2b14a53107fec583b8ecb5055d194a2c5997491cb91a7cddf989dfd787fd577d

    SHA512

    5692ac0f30dac8f18c0c0d52578cda99ce2f3c9656b5b2c6437dda4e5c6c014e8f94f5584785c50847346be963b737e3fce0c727884955c01c9129eff2154a44

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ebxc.exe

    Filesize

    570B

    MD5

    bb96fa2eb279e1fa70ee33b80ddf5486

    SHA1

    d4eca17fd2b78bfb8264295e6f254255649ca3af

    SHA256

    bb828b95aa2bef4d424ae1ecc976435ad053b06ec5e89af75de2763b0cce523c

    SHA512

    bd81985876a5cf9d4c579a2f0ea7738b28df12c1f2a9c4c1a8c12ace89b1a32bdf098987b807435f2cc950695015b7069b61360f55d9e3ba711359609a7e7b04

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\edfpst.jpg

    Filesize

    543B

    MD5

    f7490a6265f334876342496600dfca5c

    SHA1

    e79e42617ba61c13293b3ad44d2fdcb547fd75f3

    SHA256

    b61b5dbc2284545df43d06b8434819b95bcc6ae4e5e22617f05a97e5ac2fef17

    SHA512

    b2ee0fd841a658df4ccb2db1d63a31aeebf47baa4a3ff6d8fd956ad76531e131b61a637b2ba49e1d161b6950c06e838b61bc19bf840832c68cc559649acc9c06

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fkawpxd.ppt

    Filesize

    514B

    MD5

    3d8dd208a1bc990063b574044319ff30

    SHA1

    8a028e38eecaaa27c448ec281bfc1a00045895b5

    SHA256

    84d1770a96d4802e652390702f6022d144238548a7f0f6a80497975165cfe2c3

    SHA512

    62e46b51fe8569d5c24a96f398ab826457f5ed2a98fa7af27e012bbad7a83c6d6a0d31338192d0276617c2c99314bb71ab13d995db4118ba54c5909b706467cf

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fuvdg.msc

    Filesize

    529B

    MD5

    2ddf35f6efa65e7b1e286e3839980288

    SHA1

    dcbcfd1ed8d5a63e07b89bdf65ec39af1373c4f8

    SHA256

    8da7643f1455aed90195609e344014ada2f338c6f7e59c68faef3a7714f84b3b

    SHA512

    980bb720a6326d2f60e7e3e70ef65b3131b1166383cbc42b57d5474d03f884ab271da8847f2679d640931813cf27c88800b9a1f780a6f6912e9cd98dc948e887

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\gbkusncub.ppt

    Filesize

    925KB

    MD5

    0adb9b817f1df7807576c2d7068dd931

    SHA1

    4a1b94a9a5113106f40cd8ea724703734d15f118

    SHA256

    98e4f904f7de1644e519d09371b8afcbbf40ff3bd56d76ce4df48479a4ab884b

    SHA512

    883aa88f2dba4214bb534fbdaf69712127357a3d0f5666667525db3c1fa351598f067068dfc9e7c7a45fed4248d7dca729ba4f75764341e47048429f9ca8846a

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\gkgmtswhmc.jpg

    Filesize

    513B

    MD5

    45d2330198499ebfd1b73e984826fe5e

    SHA1

    6178824c68fb54d2e79aa6914b517530628b8220

    SHA256

    7407261ce6f3f09ffb85b70a630d7d951e2bd88f709b7f504f2dbef21bd3dd6c

    SHA512

    86056988f1eee5339620c8906aaa4914718d3b8ceb6c69ae65401358dfab1ff66cda12de286770fe675104358d31b200a4d60b24f8c224ada2ac0a4640fb359f

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\havvtivnup.bmp

    Filesize

    540B

    MD5

    5a33acb108a1c219ed1194d8381cd40a

    SHA1

    d55846b97a021bbe4dcf490085a0824ad2c38961

    SHA256

    f26513a135fa2e295c130a54290838e954b668d5aa013887f12b09ca0a735e93

    SHA512

    a18fd243b2463ff6ea3cb61c7347cfa3c66f757647e9185a8a65114de11def9bd0ca40d8bc08da3ed0f45f913b948a7e377367d1d93739beb2d593e5496229c5

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ijqn.mgf

    Filesize

    351KB

    MD5

    fae6ee35c0f5ac2dc4885c0de8e88032

    SHA1

    587bf6f4105d4420762c463ba33e9e3ba677e85f

    SHA256

    4db090b6f1cd2501c929b31c2e29d4d0a4ddf1e81be6800e763d8c45bea8744d

    SHA512

    1ce62d900017dd4545023acc3ca32daee7eb454a6144c99958d57e88838402013854f410b8be1fb5d607819c48ba72fefecc11d2c78a81408855bf3899e04b38

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\jqgrvgmurv.docx

    Filesize

    581B

    MD5

    16fa357e6e8840d33742a7717112abd8

    SHA1

    866906ce593fbc4b7a27f7c4d6ed172a225b0d50

    SHA256

    6b5ea4f4f6718ff1f3ec6b8c7f6518f447de4cea2ab2dac8a5371202487b7939

    SHA512

    a4d39e318aabee034e1225ed91c7ea06f1cd93b013cde0ef34bd6e3b2ce4719615efe7f9da98611d872d6fdf7062c4d13079776b27c75bb407332bc0cf443c5d

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ojmspoptet.mp3

    Filesize

    512B

    MD5

    470edbbda73def0f717d602dd7f78c56

    SHA1

    7aaa4969c33a33a770534cbabbeb8bb100106a7f

    SHA256

    bdb2567db5e89eeb431c2c4dfac73673e50b512258684cc67d9ccea0b2665b64

    SHA512

    47a1c4a233d6f52a7f756d17861552fda764b8d20cdbf61155f9445905ae7885050e39788b991692452ad71a76abb3765a7d20e5edd9838c6f77478c60550ce9

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qwmk.xls

    Filesize

    637B

    MD5

    81feb95c89263dc75504bff8e06a5d90

    SHA1

    10454bc7f50a03508fa973874fbdcf433bd2d2f6

    SHA256

    85609bb1d624bcbc6db2a4db193e871d08c3c22f826f214dd34cb0cb3255b479

    SHA512

    029325eba2ddf3fc3c263a4719df6963433bab9bf4e568ee007662b62289ee69cf4e28566975679230d95e67f7697a28e4a300fdb27844c22fb810506b3306cf

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\rwwk.vbe

    Filesize

    62KB

    MD5

    465381aa4e9b430423f61894f1ca3b7a

    SHA1

    cb87f2e9902cd6fd1559afaffbf93d427e2db11c

    SHA256

    2bd6653b99fc6535c1fcae63c1091f6bc227e20a72b0501f46eebee5e073677a

    SHA512

    8f38351940dbe639c447b06cd3004d421669d3f880c2e6c0db421a2774cc92a91d6aa66e58a27e688b49d6b6881eb4134ac20a707891630516da5ab7406666e0

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\sltfiwsc.dll

    Filesize

    42KB

    MD5

    9c3405160c29af9d745c01e85258d216

    SHA1

    28fc240be5dab0d20e11513c838039b1edfd8eae

    SHA256

    a197e7a9fe3a95b01be43406fa6b497d3e5a650af15665bcbeb1d47b5566b81d

    SHA512

    2c41e654c916ac53381742a29cdbd8ab00134f51d18799397ab86709eb89247b911f269dba871860f39f0b874e50773bd11fd085171ec2155a02e73e41e221e4

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\sltfiwsc.dll

    Filesize

    42KB

    MD5

    22f822322ddddb7e3169080058b05ae6

    SHA1

    125f3af3d92bf7852ad9936449c0f66d8ddc9b2a

    SHA256

    b5ae6a489465ef6111a05c70e4c455825da1aefa4da28672ab14708fc862c8e5

    SHA512

    9339143cde357a11eb17b2ea358a4f7c20d8ba1c013130cf5b135e5f31152e73216b3145a8d95bbdab463ccdde905b9156edce9f67efda6b0ae8161d3ea51946

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\tjif.icm

    Filesize

    528B

    MD5

    6f6df56c43cc6f1c193aad1c7ab82d06

    SHA1

    854f0199c9223417a3b6f82ada40afae98d144b6

    SHA256

    1ac36434bcaf1b5092e4c4ad1038cca646817fe26c12d9efea0d1ee708f5e7b6

    SHA512

    0ed1a079782d22bd1f4f5ef8c990cb1cdfb35042acb3e636e539468ea81d9c76ce9d8fbd9250e490b80808a19cffc151832279d630529a370aeb97452be9cf23

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xuncqfg.bin

    Filesize

    543B

    MD5

    f0e4edf30f267fbc4c721e275845377a

    SHA1

    04ecffcbfbaea9c4e75f005e19cfee8146c6bb34

    SHA256

    7d06a00c8471f7e712c435ef1ccbe2e9d84550db3cdc9849d33fd8fb9e49985b

    SHA512

    d90197c3f3a5fd8237cc5db49106763af311f4084b71a12e4755152e2fc740cfb1c1b9f3ae468bef489c3c1cdc776f576f98cbe82e740040fe09262aa9bde253

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xxmcsujdoo.das

    Filesize

    509B

    MD5

    1f26c199cc3920e832244b417095e92d

    SHA1

    0377748fa2da7c3d521b800f6f84b76f8f975418

    SHA256

    80489b9caf4a3e00356ae69a3d94ca7b5afb54e162e4cd2b2ab5f57dd91ea1ed

    SHA512

    dddd31c3d68cdafeb3fc5eeb54fcb8d5221db34c7afec1374c727f900971807a2e064828611f75ac58a66cbce3bda67a0b7db3b7e63ef97a2cf61f231a5beea7

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xxqgue.bin

    Filesize

    527B

    MD5

    49b1d10a8bee0b150f2662b0b0fd9de3

    SHA1

    e276a3601859997b41081f368c8aac69e7ee97b2

    SHA256

    ed87e32fb424996b03e4ca15b2ea08804e2098d2b8c534b1ff2b932bbe7184ee

    SHA512

    1ad7647287a8cdb62f760f7f154808966a7df689c98919caef1f5c6d03c0059cf50503d72987ee7acea3aea06c886ad2da133eba31e39048b882c98045a056a7

  • \Users\Admin\AppData\Local\Temp\RegSvcs.exe

    Filesize

    44KB

    MD5

    0e06054beb13192588e745ee63a84173

    SHA1

    30b7d4d1277bafd04a83779fd566a1f834a8d113

    SHA256

    c5d6d56ded55fbd6c150ee3a0eb2e5671cae83106be2be4d70ce50aa50bab768

    SHA512

    251a112f3f037e62ff67a467389e47a56afb344bc942b17efa9bd2970494718b26bbee9adc3ac35f93ee4d2114aa426b6d0ea4bafad294b6c118a15f1977c215

  • memory/2912-131-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB