Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/11/2024, 19:42

General

  • Target

    cac980acc37ac70069524ddfb9f266bf1989c76a251463b7e14f0e33dfec02ac.exe

  • Size

    2.9MB

  • MD5

    4e933e5c41b9f9b329fd7a7f98cdf162

  • SHA1

    8c4b478b30744b2d35f4944c6cf2f64c6f77c077

  • SHA256

    cac980acc37ac70069524ddfb9f266bf1989c76a251463b7e14f0e33dfec02ac

  • SHA512

    a0eefdd7cc45fd3c4966988bf9acfb005b1c221424c7c69b0636507b3fed871fe06c257c90173c03b90368a6505e408871eafacb94951bc109eb78f3e4a53eed

  • SSDEEP

    49152:DjvWwel6be7FSr8fu3nHeN76kOITgbIUOlNvph+vbNnYLX1HwkG54zF:DiwY6be7gPnc6kxTxUGNvpiN2X1HwkGK

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cac980acc37ac70069524ddfb9f266bf1989c76a251463b7e14f0e33dfec02ac.exe
    "C:\Users\Admin\AppData\Local\Temp\cac980acc37ac70069524ddfb9f266bf1989c76a251463b7e14f0e33dfec02ac.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1716
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C "C:\Users\Admin\AppData\Roaming\47gwlunu\pqb4km.bat"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Users\Admin\AppData\Roaming\47gwlunu\msci.exe
        "C:\Users\Admin\AppData\Roaming\47gwlunu\msci.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2900
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce" /V "msci" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\47gwlunu\msci.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2660
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce" /V "msci" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\47gwlunu\msci.exe"
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:2624

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabCAA1.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Roaming\47gwlunu\TeamViewer.ini

    Filesize

    173B

    MD5

    ba7e1e3e3c5028600982587a1fefdc05

    SHA1

    e86460e4e4c2d7053d6a6b63b6c28dbf5e5c0704

    SHA256

    12fc4ddf7418fad265ebd37042cc94292a3ab8f02bcab6f2d4bb09acb31edca5

    SHA512

    f99cb610ef748134d74fb7d19b717656f665396e46feafc368c80aa41544d25bc74d607f6e35307f85b2fd84dff5316df5d57dafafae0d2f65901d929015467c

  • C:\Users\Admin\AppData\Roaming\47gwlunu\TeamViewer_Desktop.exe

    Filesize

    2.1MB

    MD5

    95b5331ae88259d3a9dda90f2a29905c

    SHA1

    3df3d52c6fc9e1811954a0b66c0e29f52f844a8e

    SHA256

    9fe4685f1d76b3c0ff80e2b9348d5f1b5a7856d472ae4be4b0fe9d9c08d32669

    SHA512

    e9e67334758f2261131310b1ecf9dd9f6d70a123b3519110ec781d3dd26b7832734cee45c6643809b741d74b0c9d9f3b3abddefb427a4d691a31a9cef81848db

  • C:\Users\Admin\AppData\Roaming\47gwlunu\TeamViewer_Resource_en.dll

    Filesize

    1.2MB

    MD5

    97878dceaf0632f49b75601e998c53e1

    SHA1

    ee60be147721e2c4ef5d7d6860fce8645b2088e6

    SHA256

    a40088e36440f9de74bbd2d6e5cf969ab42ff629cea6d685cc9d8300b91b5028

    SHA512

    9691057e6f0aefeac2c4275c278ac8cbe5ac95d820bd92b2e65c0d8aee6768241b4832b31db7df2e0b203c77b2c486662bdd31c66892b84bb2a49edabda9abf7

  • C:\Users\Admin\AppData\Roaming\47gwlunu\pqb4km.bat

    Filesize

    143B

    MD5

    52fe1a307b369e7a85c8423f6e593cde

    SHA1

    9dde7d50fff541f230165d1dcc07a60304abe37c

    SHA256

    eccb581f12e8b70ccd200f2ef6a8a995ca2d830e5b8442a9eda75c868117ded3

    SHA512

    22e0cdde503bed630ac006dae2c069853b5ae8ee7bdbc2eeb8d6cb6938e542cf3fb0fe2e2461f334d28e076c6fcd102deb6aea8ce8e6c9444f850b15a864c03e

  • C:\Users\Admin\AppData\Roaming\47gwlunu\tv_w32.dll

    Filesize

    49KB

    MD5

    d1cae98656bc6703e21f4580b8830dfc

    SHA1

    d0c1f9219380ae73c5b151e5c7afa9e11c07bd97

    SHA256

    d2b39bcf9ca3888887fb84a0897fcb80dccacc5ccfb5a66357e3dbdcafee3904

    SHA512

    1270c00a01be2d8e27dc31a3e355eee8e5f56330674ec9776e2a5c6ba7990c3a4d4eccc501675e83e4baed977ea94dde2c857f63400564b85a27a94910d07cae

  • C:\Users\Admin\AppData\Roaming\47gwlunu\tv_w32.exe

    Filesize

    106KB

    MD5

    7d90bdf0f9c2d9224d8b4d5d2f195506

    SHA1

    aa1bef60878b8c43c6fd763a0bf83b65a488ba81

    SHA256

    c96ed3b60727973d746834eaec3df520447a039dc447f717f6cd32335e2dc1d0

    SHA512

    4b08e6b4da089d46ce806baa1c3896d46bf9aa3598141502c3dd62683d97a50e560e48c1060bde0e959b3e33f05b1fc43056cf99b2252a9a1a0099294bd6a5b6

  • C:\Users\Admin\AppData\Roaming\47gwlunu\tv_x64.dll

    Filesize

    52KB

    MD5

    dcd8cda46bb20ff09c8c8be8be2f3098

    SHA1

    f39483343c5f95011131048cc0326ab1d034ef29

    SHA256

    a21dafab3d25f88d7001de9437f0a01c72d66db0c1a190dd5acdb2cc38ea9513

    SHA512

    9d28691f3532f8126429940623872503560c3244d111b64d3e598e08d961f8bb05efc87247d5f78b288506d8e77e08a9ce20c76cc8ac14b28a84d26f2d8f8565

  • C:\Users\Admin\AppData\Roaming\47gwlunu\tv_x64.exe

    Filesize

    141KB

    MD5

    e0331b54a56e7aa48f97b4956bcef769

    SHA1

    2907cf777d6cf92656c8de211093751e12ddf9c4

    SHA256

    7a487c2cba93e7d6963930c5734f14d6cf17e85fc2316d6aeccd617100a1ff9f

    SHA512

    dc423898519ac48ca0b12e72076e7e9441e35f0fbc409af95b90288f3fefe23a2cd4a4b9c83e1a3dc123b0fcd2ea4f8ca981bb667be56be2cdcf8ad4df047aaf

  • C:\Users\Admin\AppData\Roaming\47gwlunu\xfw3uh2u.bmp

    Filesize

    8KB

    MD5

    261ce74462623bdf88c3c75d33ee85d9

    SHA1

    cfab59f5bcafb80aefbbde2fabea735036480740

    SHA256

    079fc634ee4786ab5c1982e25ab47503d079934e48795233d92a972d3202bbba

    SHA512

    f7138997afd536205d573032ff9698f798d35f1546cccd30950906d6d7e39d12149c7545bc21053c9cc247efdc7b9890ee134d2bdd2efbb6f67190778bc70fe4

  • C:\Users\Admin\AppData\Roaming\47gwlunu\zn6wxcf5.cfg

    Filesize

    35B

    MD5

    e135b2e6b7d74475b180e5ab71d98774

    SHA1

    fa63c797fc161f1e6ce5e393c6702262eb73f313

    SHA256

    023155419b69c2886616b40561905e974a22e1cec6f5099b247ddc03a50f9062

    SHA512

    0de5594e0f1b1852b66cdadee62f33a86061fe398895618cb093f712e20534d9d9c96c602de7cd0913759d2a7ebdac462b6674dab15234baba337c0c0d61c34f

  • \Users\Admin\AppData\Local\Temp\nsoBB45.tmp\ExecCmd.dll

    Filesize

    4KB

    MD5

    b9380b0bea8854fd9f93cc1fda0dfeac

    SHA1

    edb8d58074e098f7b5f0d158abedc7fc53638618

    SHA256

    1f4bd9c9376fe1b6913baeca7fb6df6467126f27c9c2fe038206567232a0e244

    SHA512

    45c3ab0f2bce53b75e72e43bac747dc0618342a3f498be8e2eb62a6db0b137fcdb1735da83051b14824996b5287109aa831e5859d6f21f0ed21b76b3d335418c

  • \Users\Admin\AppData\Local\Temp\nsoBB45.tmp\System.dll

    Filesize

    11KB

    MD5

    34442e1e0c2870341df55e1b7b3cccdc

    SHA1

    99b2fa21aead4b6ccd8ff2f6d3d3453a51d9c70c

    SHA256

    269d232712c86983336badb40b9e55e80052d8389ed095ebf9214964d43b6bb1

    SHA512

    4a8c57fb12997438b488b862f3fc9dc0f236e07bb47b2bce6053dcb03ac7ad171842f02ac749f02dda4719c681d186330524cd2953d33cb50854844e74b33d51

  • \Users\Admin\AppData\Local\Temp\nsoBB45.tmp\WndSubclass.dll

    Filesize

    3KB

    MD5

    2a0c44144e261987ec40adf991535ae0

    SHA1

    7a5bc7c897d3e89a2b231740ae61b9574fb1d3e1

    SHA256

    cfcf2f3dd8f1e58c0b3d8279eb9ec2a1dafb297b2f8cce90f4951f3d4a311af6

    SHA512

    f7b70e998974c42a160194b59c4d962d8ca99eb1cee07913a12b69efd836d21c614572114302e9b1cafdfb8391b9d03a1f38745139a47aa3d881ff5cb3a6f0db

  • \Users\Admin\AppData\Local\Temp\nsoBB45.tmp\nsis7z.dll

    Filesize

    436KB

    MD5

    d7778720208a94e2049972fb7a1e0637

    SHA1

    080d607b10f93c839ec3f07faec3548bb78ac4dc

    SHA256

    98f425f30e42e85f57e039356e30d929e878fdb551e67abfb9f71c31eeb5d44e

    SHA512

    98493ea271738ed6ba3a02de774deef267bfa3c16f3736f1a1a3856b9fecc07f0ea8670827e7eb4ed05c907e96425a0c762e7010cb55a09302ca3cfb3fe44b2b

  • \Users\Admin\AppData\Roaming\47gwlunu\msci.exe

    Filesize

    7.0MB

    MD5

    28c4c35aed7949277a9c68a04a113114

    SHA1

    2a845df5253b3f5becb9c83527c9bfd3113be092

    SHA256

    5c80b0ced982b868d7e2ba6269509f597a05704fa6d86a30e8d51bf5687c3361

    SHA512

    ed4ca23c7efd4fbf39ae50dc14020aead7d515e27b002aa2dd7a5417ba63c550d19120f84ef7058147035dfbc55f937debbde61bcd1af2e2070ae6b04b786618

  • memory/2900-77-0x0000000007000000-0x000000000706D000-memory.dmp

    Filesize

    436KB

  • memory/2900-64-0x0000000007001000-0x0000000007068000-memory.dmp

    Filesize

    412KB

  • memory/2900-73-0x0000000007000000-0x000000000706D000-memory.dmp

    Filesize

    436KB

  • memory/2900-75-0x0000000007000000-0x000000000706D000-memory.dmp

    Filesize

    436KB

  • memory/2900-76-0x0000000007000000-0x000000000706D000-memory.dmp

    Filesize

    436KB

  • memory/2900-74-0x0000000007000000-0x000000000706D000-memory.dmp

    Filesize

    436KB

  • memory/2900-98-0x0000000007000000-0x000000000706D000-memory.dmp

    Filesize

    436KB

  • memory/2900-102-0x0000000007000000-0x000000000706D000-memory.dmp

    Filesize

    436KB

  • memory/2900-101-0x0000000007001000-0x0000000007068000-memory.dmp

    Filesize

    412KB

  • memory/2900-100-0x0000000007000000-0x000000000706D000-memory.dmp

    Filesize

    436KB