Analysis

  • max time kernel
    117s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2024 12:03

General

  • Target

    0rr48RlGuyf8MbsABD4Fd5xg.exe

  • Size

    1.1MB

  • MD5

    3b4348d187f24c82370836531f3fa94e

  • SHA1

    a2ca4e9f4a8d9c8634e42765e90e252803e20b15

  • SHA256

    cd189a8c952420bf33b68cce03b41900e8c784b1010213b097ecdb2d7e8079f7

  • SHA512

    2bab3c1e38a21cefc06363db75931bf3bfe0b4ee3f089293a750dfc866abc32c7135d2d9ba7ccb005aa01ad02d0a75a5fa02f85ca78cc8fe637615b7fa9e7394

  • SSDEEP

    24576:eDTLDJqGd+zowht2zmctw1CdvHh82JdjGY6LvxwAgRp54+/jrNtIf:qzdkBTce1CxHh8mlGY6LJBu54MjJaf

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0rr48RlGuyf8MbsABD4Fd5xg.exe
    "C:\Users\Admin\AppData\Local\Temp\0rr48RlGuyf8MbsABD4Fd5xg.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2288
    • C:\Windows\SysWOW64\mshta.exe
      "C:\Windows\System32\mshta.exe" vBscrIpT: ClOsE ( CrEaTeobjeCt ( "WsCRIPt.SHELl" ). RUN( "cmD.EXe /C coPy /y ""C:\Users\Admin\AppData\Local\Temp\0rr48RlGuyf8MbsABD4Fd5xg.exe"" Z2bT94N_CMSE.Exe && START Z2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo &IF """" == """" for %j iN ( ""C:\Users\Admin\AppData\Local\Temp\0rr48RlGuyf8MbsABD4Fd5xg.exe"" ) do taskkill -im ""%~NXj"" -f " , 0 , tRue ) )
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C coPy /y "C:\Users\Admin\AppData\Local\Temp\0rr48RlGuyf8MbsABD4Fd5xg.exe" Z2bT94N_CMSE.Exe && START Z2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo&IF "" == "" for %j iN ( "C:\Users\Admin\AppData\Local\Temp\0rr48RlGuyf8MbsABD4Fd5xg.exe" ) do taskkill -im "%~NXj" -f
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe
          Z2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Windows\SysWOW64\mshta.exe
            "C:\Windows\System32\mshta.exe" vBscrIpT: ClOsE ( CrEaTeobjeCt ( "WsCRIPt.SHELl" ). RUN( "cmD.EXe /C coPy /y ""C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe"" Z2bT94N_CMSE.Exe && START Z2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo &IF ""-PMrvgB7ejl2YIjc3PC8aTZbo"" == """" for %j iN ( ""C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe"" ) do taskkill -im ""%~NXj"" -f " , 0 , tRue ) )
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of WriteProcessMemory
            PID:2696
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\System32\cmd.exe" /C coPy /y "C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe" Z2bT94N_CMSE.Exe && START Z2Bt94N_cMSE.eXE -PMrvgB7ejl2YIjc3PC8aTZbo&IF "-PMrvgB7ejl2YIjc3PC8aTZbo" == "" for %j iN ( "C:\Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe" ) do taskkill -im "%~NXj" -f
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2596
          • C:\Windows\SysWOW64\rundll32.exe
            "C:\Windows\System32\rundll32.exe" .\HwWYSzK.F2,zgr
            5⤵
            • Blocklisted process makes network request
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2624
            • C:\Users\Admin\AppData\Local\Temp\f781094.exe
              "C:\Users\Admin\AppData\Local\Temp\f781094.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2768
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 532
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2168
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill -im "0rr48RlGuyf8MbsABD4Fd5xg.exe" -f
          4⤵
          • System Location Discovery: System Language Discovery
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2892

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\HwWYSzK.F2

    Filesize

    1.3MB

    MD5

    8586e83a33f4c1b8d81f568155663be7

    SHA1

    95a37fbaeb58fafbe14dfae8f539aeff509efb1f

    SHA256

    85ec523c939d552531246b8fe2f795b4623e1108945824525d549fda22d2afb9

    SHA512

    51aafad0bc8cd058196c042dab1c000a62a13caeaf5e432e2e7c5f8452b36e4e3a64e66b0aa9a981979edacc37c581957448a00ac5bd154e8081c06eb0de442f

  • \Users\Admin\AppData\Local\Temp\Z2bT94N_CMSE.Exe

    Filesize

    1.1MB

    MD5

    3b4348d187f24c82370836531f3fa94e

    SHA1

    a2ca4e9f4a8d9c8634e42765e90e252803e20b15

    SHA256

    cd189a8c952420bf33b68cce03b41900e8c784b1010213b097ecdb2d7e8079f7

    SHA512

    2bab3c1e38a21cefc06363db75931bf3bfe0b4ee3f089293a750dfc866abc32c7135d2d9ba7ccb005aa01ad02d0a75a5fa02f85ca78cc8fe637615b7fa9e7394

  • \Users\Admin\AppData\Local\Temp\f781094.exe

    Filesize

    21KB

    MD5

    858939a54a0406e5be7220b92b6eb2b3

    SHA1

    da24c0b6f723a74a8ec59e58c9c0aea3e86b7109

    SHA256

    a30f30a109cb78d5eb1969f6c13f01a1e0a5f07b7ad8b133f5d2616223c1ce0a

    SHA512

    8875d1e43ea59314695747796894a2f171e92f7b04024dbc529af1497331489e279cd06ea03061288089d2f07ad437178b9d62f0bae2e16ae0b95c5681569401

  • memory/2624-22-0x0000000003700000-0x0000000003FBE000-memory.dmp

    Filesize

    8.7MB

  • memory/2624-25-0x0000000004060000-0x00000000040F1000-memory.dmp

    Filesize

    580KB

  • memory/2624-14-0x0000000000E90000-0x0000000000F2D000-memory.dmp

    Filesize

    628KB

  • memory/2624-17-0x0000000000E90000-0x0000000000F2D000-memory.dmp

    Filesize

    628KB

  • memory/2624-21-0x0000000000E90000-0x0000000000F2D000-memory.dmp

    Filesize

    628KB

  • memory/2624-12-0x0000000000830000-0x0000000000977000-memory.dmp

    Filesize

    1.3MB

  • memory/2624-23-0x0000000003FC0000-0x0000000004055000-memory.dmp

    Filesize

    596KB

  • memory/2624-13-0x0000000003640000-0x00000000036F1000-memory.dmp

    Filesize

    708KB

  • memory/2624-24-0x0000000004060000-0x00000000040F1000-memory.dmp

    Filesize

    580KB

  • memory/2624-27-0x0000000004060000-0x00000000040F1000-memory.dmp

    Filesize

    580KB

  • memory/2624-28-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2624-30-0x0000000000100000-0x0000000000104000-memory.dmp

    Filesize

    16KB

  • memory/2624-31-0x0000000000110000-0x0000000000116000-memory.dmp

    Filesize

    24KB

  • memory/2624-11-0x0000000000830000-0x0000000000977000-memory.dmp

    Filesize

    1.3MB

  • memory/2768-52-0x0000000000D60000-0x0000000000D68000-memory.dmp

    Filesize

    32KB