Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/11/2024, 19:42

General

  • Target

    d33cc2d538e6f8b0720a7fadf6b24b38ac9b3a1df516fa09feb24054d9cdd14c.exe

  • Size

    2.7MB

  • MD5

    66f9efe6e6fa8b50e72b40ce1ab5ba7c

  • SHA1

    f8be7ab0c0eb3b935479b7bdd706251044e03341

  • SHA256

    d33cc2d538e6f8b0720a7fadf6b24b38ac9b3a1df516fa09feb24054d9cdd14c

  • SHA512

    cbb8f2c8805f2559c040a9279b784fe0013e453a2bf8c0057ec7487fe41ae052fb81a44d5fe92ff186c24421f3aff54abc2d9506b92e35bd62089c4db7805e46

  • SSDEEP

    49152:ajvWw6sB4o5Av4lM8NuSk3anyLeiiUCA7C4L8LyQZLU0k/4kOJ:aiwF35AvSM8N+3any63UCA7CU8rZI0ka

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 13 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d33cc2d538e6f8b0720a7fadf6b24b38ac9b3a1df516fa09feb24054d9cdd14c.exe
    "C:\Users\Admin\AppData\Local\Temp\d33cc2d538e6f8b0720a7fadf6b24b38ac9b3a1df516fa09feb24054d9cdd14c.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2424
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /C "C:\Users\Admin\AppData\Roaming\lh5m9ll\39fdpx.bat"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2868
      • C:\Users\Admin\AppData\Roaming\lh5m9ll\msci.exe
        "C:\Users\Admin\AppData\Roaming\lh5m9ll\msci.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce" /V "msci" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\lh5m9ll\msci.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2832
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce" /V "msci" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\lh5m9ll\msci.exe"
            5⤵
            • Adds Run key to start application
            • System Location Discovery: System Language Discovery
            PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\CabD8D4.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Roaming\lh5m9ll\39fdpx.bat

    Filesize

    142B

    MD5

    e24eae8c6380de90577d78d3a4af06be

    SHA1

    9c652c9bb00eaa627b127ad203b9c89189570d15

    SHA256

    18e8222f5ade71b5621be952bfaffead2ae59df7a3b2fbe6b50a3f49a8bb9fa4

    SHA512

    cddb1bcde67ee525305497ab3feb47a960bd51210cd636425607997890a3def3732cf9ce170e535a097a09cc98992cee163c546424a0598af6a2ad754bab87e0

  • C:\Users\Admin\AppData\Roaming\lh5m9ll\TeamViewer.ini

    Filesize

    173B

    MD5

    ba7e1e3e3c5028600982587a1fefdc05

    SHA1

    e86460e4e4c2d7053d6a6b63b6c28dbf5e5c0704

    SHA256

    12fc4ddf7418fad265ebd37042cc94292a3ab8f02bcab6f2d4bb09acb31edca5

    SHA512

    f99cb610ef748134d74fb7d19b717656f665396e46feafc368c80aa41544d25bc74d607f6e35307f85b2fd84dff5316df5d57dafafae0d2f65901d929015467c

  • C:\Users\Admin\AppData\Roaming\lh5m9ll\TeamViewer_Desktop.exe

    Filesize

    2.1MB

    MD5

    95b5331ae88259d3a9dda90f2a29905c

    SHA1

    3df3d52c6fc9e1811954a0b66c0e29f52f844a8e

    SHA256

    9fe4685f1d76b3c0ff80e2b9348d5f1b5a7856d472ae4be4b0fe9d9c08d32669

    SHA512

    e9e67334758f2261131310b1ecf9dd9f6d70a123b3519110ec781d3dd26b7832734cee45c6643809b741d74b0c9d9f3b3abddefb427a4d691a31a9cef81848db

  • C:\Users\Admin\AppData\Roaming\lh5m9ll\TeamViewer_Resource_en.dll

    Filesize

    1.2MB

    MD5

    97878dceaf0632f49b75601e998c53e1

    SHA1

    ee60be147721e2c4ef5d7d6860fce8645b2088e6

    SHA256

    a40088e36440f9de74bbd2d6e5cf969ab42ff629cea6d685cc9d8300b91b5028

    SHA512

    9691057e6f0aefeac2c4275c278ac8cbe5ac95d820bd92b2e65c0d8aee6768241b4832b31db7df2e0b203c77b2c486662bdd31c66892b84bb2a49edabda9abf7

  • C:\Users\Admin\AppData\Roaming\lh5m9ll\o3e3cp.cfg

    Filesize

    35B

    MD5

    475d39e82e63339c288e22e4ef2e3052

    SHA1

    e0ef2f8ef39b10bb3699e2fb91cf81a82b670f4d

    SHA256

    ca44e69ef56379d629dcf11e8f7ea25b0f0868f762e0ce67809c61e416f3c283

    SHA512

    f1efcf6a53329c6feeda4f43efdf8deab5452b3ef39e9887ac09489c34963e004b68040146fb7b03a42c3f326de40c9896a069ab77359390c76ebe6b32fd38bf

  • C:\Users\Admin\AppData\Roaming\lh5m9ll\sss93w1p.bmp

    Filesize

    6KB

    MD5

    4978b1de77711406ad22d9a54a383ad2

    SHA1

    f7e602b956954016cc94e227fc6c166e362fe84b

    SHA256

    bd74af8249bff9acf77c550dac3960d767e347e9dcdac9e4707c5f1c1482f8d9

    SHA512

    b39b7fe52953b0eeaec7e34cd81997b25749644182af6da416f9a577bd2b68e37634a996e6606a12850a87cf3cb8635a940fbe0beeece4a8528b3660bc2b1783

  • C:\Users\Admin\AppData\Roaming\lh5m9ll\tv_w32.dll

    Filesize

    49KB

    MD5

    d1cae98656bc6703e21f4580b8830dfc

    SHA1

    d0c1f9219380ae73c5b151e5c7afa9e11c07bd97

    SHA256

    d2b39bcf9ca3888887fb84a0897fcb80dccacc5ccfb5a66357e3dbdcafee3904

    SHA512

    1270c00a01be2d8e27dc31a3e355eee8e5f56330674ec9776e2a5c6ba7990c3a4d4eccc501675e83e4baed977ea94dde2c857f63400564b85a27a94910d07cae

  • C:\Users\Admin\AppData\Roaming\lh5m9ll\tv_w32.exe

    Filesize

    106KB

    MD5

    7d90bdf0f9c2d9224d8b4d5d2f195506

    SHA1

    aa1bef60878b8c43c6fd763a0bf83b65a488ba81

    SHA256

    c96ed3b60727973d746834eaec3df520447a039dc447f717f6cd32335e2dc1d0

    SHA512

    4b08e6b4da089d46ce806baa1c3896d46bf9aa3598141502c3dd62683d97a50e560e48c1060bde0e959b3e33f05b1fc43056cf99b2252a9a1a0099294bd6a5b6

  • C:\Users\Admin\AppData\Roaming\lh5m9ll\tv_x64.dll

    Filesize

    52KB

    MD5

    dcd8cda46bb20ff09c8c8be8be2f3098

    SHA1

    f39483343c5f95011131048cc0326ab1d034ef29

    SHA256

    a21dafab3d25f88d7001de9437f0a01c72d66db0c1a190dd5acdb2cc38ea9513

    SHA512

    9d28691f3532f8126429940623872503560c3244d111b64d3e598e08d961f8bb05efc87247d5f78b288506d8e77e08a9ce20c76cc8ac14b28a84d26f2d8f8565

  • C:\Users\Admin\AppData\Roaming\lh5m9ll\tv_x64.exe

    Filesize

    141KB

    MD5

    e0331b54a56e7aa48f97b4956bcef769

    SHA1

    2907cf777d6cf92656c8de211093751e12ddf9c4

    SHA256

    7a487c2cba93e7d6963930c5734f14d6cf17e85fc2316d6aeccd617100a1ff9f

    SHA512

    dc423898519ac48ca0b12e72076e7e9441e35f0fbc409af95b90288f3fefe23a2cd4a4b9c83e1a3dc123b0fcd2ea4f8ca981bb667be56be2cdcf8ad4df047aaf

  • \Users\Admin\AppData\Local\Temp\nsdC9A6.tmp\ExecCmd.dll

    Filesize

    4KB

    MD5

    b9380b0bea8854fd9f93cc1fda0dfeac

    SHA1

    edb8d58074e098f7b5f0d158abedc7fc53638618

    SHA256

    1f4bd9c9376fe1b6913baeca7fb6df6467126f27c9c2fe038206567232a0e244

    SHA512

    45c3ab0f2bce53b75e72e43bac747dc0618342a3f498be8e2eb62a6db0b137fcdb1735da83051b14824996b5287109aa831e5859d6f21f0ed21b76b3d335418c

  • \Users\Admin\AppData\Local\Temp\nsdC9A6.tmp\System.dll

    Filesize

    11KB

    MD5

    34442e1e0c2870341df55e1b7b3cccdc

    SHA1

    99b2fa21aead4b6ccd8ff2f6d3d3453a51d9c70c

    SHA256

    269d232712c86983336badb40b9e55e80052d8389ed095ebf9214964d43b6bb1

    SHA512

    4a8c57fb12997438b488b862f3fc9dc0f236e07bb47b2bce6053dcb03ac7ad171842f02ac749f02dda4719c681d186330524cd2953d33cb50854844e74b33d51

  • \Users\Admin\AppData\Local\Temp\nsdC9A6.tmp\nsDialogs.dll

    Filesize

    9KB

    MD5

    602d953c391a05d2be162a661962c598

    SHA1

    794b83002517dca3a017337946d39df55646e3e0

    SHA256

    e664756ea6bfb01787ee6dfe299f1e1cc52b0453759771124c9359cb3cf79cb4

    SHA512

    f376662cb07cb5b5ca0e2261a810f2ddabe82843464857ecedf1413949492adbabaf5df73b77f9ab8dc8f59e960298ab6576c6f50622252368e4be4b587c7c2c

  • \Users\Admin\AppData\Local\Temp\nsdC9A6.tmp\nsis7z.dll

    Filesize

    436KB

    MD5

    d7778720208a94e2049972fb7a1e0637

    SHA1

    080d607b10f93c839ec3f07faec3548bb78ac4dc

    SHA256

    98f425f30e42e85f57e039356e30d929e878fdb551e67abfb9f71c31eeb5d44e

    SHA512

    98493ea271738ed6ba3a02de774deef267bfa3c16f3736f1a1a3856b9fecc07f0ea8670827e7eb4ed05c907e96425a0c762e7010cb55a09302ca3cfb3fe44b2b

  • \Users\Admin\AppData\Roaming\lh5m9ll\msci.exe

    Filesize

    7.0MB

    MD5

    28c4c35aed7949277a9c68a04a113114

    SHA1

    2a845df5253b3f5becb9c83527c9bfd3113be092

    SHA256

    5c80b0ced982b868d7e2ba6269509f597a05704fa6d86a30e8d51bf5687c3361

    SHA512

    ed4ca23c7efd4fbf39ae50dc14020aead7d515e27b002aa2dd7a5417ba63c550d19120f84ef7058147035dfbc55f937debbde61bcd1af2e2070ae6b04b786618

  • memory/2748-75-0x0000000007000000-0x000000000708E000-memory.dmp

    Filesize

    568KB

  • memory/2748-65-0x0000000007001000-0x0000000007088000-memory.dmp

    Filesize

    540KB

  • memory/2748-74-0x0000000007000000-0x000000000708E000-memory.dmp

    Filesize

    568KB

  • memory/2748-76-0x0000000007000000-0x000000000708E000-memory.dmp

    Filesize

    568KB

  • memory/2748-73-0x0000000007000000-0x000000000708E000-memory.dmp

    Filesize

    568KB

  • memory/2748-97-0x0000000007000000-0x000000000708E000-memory.dmp

    Filesize

    568KB

  • memory/2748-100-0x0000000007001000-0x0000000007088000-memory.dmp

    Filesize

    540KB

  • memory/2748-99-0x0000000007000000-0x000000000708E000-memory.dmp

    Filesize

    568KB

  • memory/2748-101-0x0000000007000000-0x000000000708E000-memory.dmp

    Filesize

    568KB