Analysis

  • max time kernel
    138s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2024 05:52

General

  • Target

    faae62d9ef3a65ae1dae20d55b8e787661aaf452ad3b6bdd80ea267d3bd070bd.exe

  • Size

    732KB

  • MD5

    659ac9c3f3c0fffb292704cb5e7dd699

  • SHA1

    a3ee2528280cd762c130f680af08583df22bb435

  • SHA256

    faae62d9ef3a65ae1dae20d55b8e787661aaf452ad3b6bdd80ea267d3bd070bd

  • SHA512

    0b99ae205eb06e39f0befef1c41776cbddda78e674c639eb51968bba4b70aad45cc7b0dbf4ad9bed12a7a82ac31943185b8f59aab082afb15d9b91924889db10

  • SSDEEP

    12288:fnWjC9X31+oqH0GOzM6/79OBu5hq9ZvbY:fUC1lmvO3/Ih9pY

Malware Config

Extracted

Family

privateloader

C2

http://212.193.30.45/proxies.txt

http://85.202.169.116/server.txt

pastebin.com/raw/A7dSG1te

http://wfsdragon.ru/api/setStats.php

85.202.169.116

Signatures

  • PrivateLoader

    PrivateLoader is a downloader sold as a pay-per-install malware distribution service.

  • Privateloader family
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\faae62d9ef3a65ae1dae20d55b8e787661aaf452ad3b6bdd80ea267d3bd070bd.exe
    "C:\Users\Admin\AppData\Local\Temp\faae62d9ef3a65ae1dae20d55b8e787661aaf452ad3b6bdd80ea267d3bd070bd.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1964
    • C:\Users\Admin\AppData\Local\Temp\faae62d9ef3a65ae1dae20d55b8e787661aaf452ad3b6bdd80ea267d3bd070bd.exe
      "C:\Users\Admin\AppData\Local\Temp\faae62d9ef3a65ae1dae20d55b8e787661aaf452ad3b6bdd80ea267d3bd070bd.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1964-0-0x0000000000270000-0x000000000036A000-memory.dmp

    Filesize

    1000KB

  • memory/1964-1-0x00000000004D0000-0x00000000004D1000-memory.dmp

    Filesize

    4KB

  • memory/2716-3-0x0000000000090000-0x00000000000C8000-memory.dmp

    Filesize

    224KB

  • memory/2716-8-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2716-7-0x0000000000090000-0x00000000000C8000-memory.dmp

    Filesize

    224KB

  • memory/2716-6-0x0000000000090000-0x00000000000C8000-memory.dmp

    Filesize

    224KB

  • memory/2716-5-0x0000000000090000-0x00000000000C8000-memory.dmp

    Filesize

    224KB

  • memory/2716-4-0x0000000000090000-0x00000000000C8000-memory.dmp

    Filesize

    224KB

  • memory/2716-2-0x0000000000090000-0x00000000000C8000-memory.dmp

    Filesize

    224KB

  • memory/2716-15-0x0000000000090000-0x00000000000C8000-memory.dmp

    Filesize

    224KB

  • memory/2716-19-0x0000000000090000-0x00000000000C8000-memory.dmp

    Filesize

    224KB

  • memory/2716-11-0x0000000000090000-0x00000000000C8000-memory.dmp

    Filesize

    224KB

  • memory/2716-20-0x0000000000090000-0x00000000000C8000-memory.dmp

    Filesize

    224KB

  • memory/2716-22-0x0000000000090000-0x00000000000C8000-memory.dmp

    Filesize

    224KB

  • memory/2716-21-0x0000000000090000-0x00000000000C8000-memory.dmp

    Filesize

    224KB