Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    13-11-2024 10:10

General

  • Target

    c34326fc248570b6d8339177e518669132547198ac2e9cf7056b46845ddd247dN.exe

  • Size

    78KB

  • MD5

    ee9a0126b812ef31dda0d48125dd8980

  • SHA1

    b740ceaffd43330544e45c0c9242239133d07eb8

  • SHA256

    c34326fc248570b6d8339177e518669132547198ac2e9cf7056b46845ddd247d

  • SHA512

    1a2e6031e6aa306b1822e71c0b94f857786ffc569b7244a24376b440306a3209b219a9f122a03dcc7ad55c978539dad76e38fff74641a277c84351d78ef3018a

  • SSDEEP

    1536:ECHF3M7t/vZv0kH9gDDtWzYCnJPeoYrGQt1p9/K1Li:ECHF8h/l0Y9MDYrm71p9/1

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c34326fc248570b6d8339177e518669132547198ac2e9cf7056b46845ddd247dN.exe
    "C:\Users\Admin\AppData\Local\Temp\c34326fc248570b6d8339177e518669132547198ac2e9cf7056b46845ddd247dN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\ubt-kuvw.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2424
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES9963.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9962.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2212
    • C:\Users\Admin\AppData\Local\Temp\tmp9740.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp9740.tmp.exe" C:\Users\Admin\AppData\Local\Temp\c34326fc248570b6d8339177e518669132547198ac2e9cf7056b46845ddd247dN.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RES9963.tmp

    Filesize

    1KB

    MD5

    72236fc4afa24dee73d19c9b166f94ac

    SHA1

    f064d11cd249314535674f19894e4663df2467ae

    SHA256

    ec89aa5a1f802849c853728b321371041a724a6eebe7ad5c82884423be1df297

    SHA512

    1353741842fc673349d953869f9b0b331774eed141b97fefba224c0ba77932299921fa613ebf4ee41404d71658605d8066d533b355b77f4a0bfddc58c35bd98f

  • C:\Users\Admin\AppData\Local\Temp\tmp9740.tmp.exe

    Filesize

    78KB

    MD5

    f7e8adc551e5ebd23197fedbc57df4c5

    SHA1

    0c17fe4c2e12fdb01954dbffbc3b2a1967d090a0

    SHA256

    09ac1417a86ab2fb88f23e37606b9123b15f28eab1f93ce53ba282f6f9cf13be

    SHA512

    f9c3734e5fffed477ea5bd90c78d4bdc2f5321345bf135d199c819412f47528cf7917c0c0607075593b0b18abff1a7a52bd6c9c1afb66477baa81eecc93e4bb6

  • C:\Users\Admin\AppData\Local\Temp\ubt-kuvw.0.vb

    Filesize

    15KB

    MD5

    f4e3cb024f0ca0143eabeeb710518e08

    SHA1

    81555a0e6dbae314eee5b6414e471aa67ccb1c35

    SHA256

    3019c8a23aa020b5914975396b0b71669ab78e4da2c4d3b98305e9ba9a4ea4b3

    SHA512

    4ded3215b97ed0cb586257ba7ecaddd4c7d0f77baabc521d0b1c223dac7d07ce809f04643f28f19bc1da2b4f9403a1d6e5e02fd0adf806075b1da8067cdf3ca8

  • C:\Users\Admin\AppData\Local\Temp\ubt-kuvw.cmdline

    Filesize

    266B

    MD5

    285564a9d9b635714de5b38d5ccad0ca

    SHA1

    2172af24948ae09107e76337e1237ddb3d3048e4

    SHA256

    84096972c09ab8ba2c90e2ca7ccc35d28a0e59b0d6b09fdbdef14b59c17c91ee

    SHA512

    32a4fdf165f633a52f270bd477e4683d2797aaf8ca7c4163fb1778ad947ac77377aff606917fd2e6ac0cd38004794e2e5ee3deb5a0291b326c59acad140a9600

  • C:\Users\Admin\AppData\Local\Temp\vbc9962.tmp

    Filesize

    660B

    MD5

    dbd4eb47b428b61a1493ac8bfe3e4466

    SHA1

    a9787d1b7889c8cc64b33582e05c620f5aed0c6d

    SHA256

    e87a49afeaffb99768f86cac351a2a491d085d6a326deffe29a5b74eb6f0a68e

    SHA512

    7cd9da2d75cef87f56a3b107e33803421efc6e51718e8043f46216fd9a53c1e7cf150ffcc73b40a2c209e3270bdeafaf96193bec61dead635b5fbdd32e6b002f

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8b25b4d931908b4c77ce6c3d5b9a2910

    SHA1

    88b65fd9733484c8f8147dad9d0896918c7e37c7

    SHA256

    79c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e

    SHA512

    6d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d

  • memory/2424-8-0x0000000073F10000-0x00000000744BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2424-18-0x0000000073F10000-0x00000000744BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2676-0-0x0000000073F11000-0x0000000073F12000-memory.dmp

    Filesize

    4KB

  • memory/2676-1-0x0000000073F10000-0x00000000744BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2676-2-0x0000000073F10000-0x00000000744BB000-memory.dmp

    Filesize

    5.7MB

  • memory/2676-24-0x0000000073F10000-0x00000000744BB000-memory.dmp

    Filesize

    5.7MB