Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14-11-2024 19:26

General

  • Target

    41589419116464448286035679864158972845276735013687.exe

  • Size

    2.7MB

  • MD5

    b00ececc12e8dedbe256613f1b945b23

  • SHA1

    97cb8249006a80e0773bb3aaba631171715ffcd4

  • SHA256

    87768a35d6a9b73f30d4d4adcd96b8c4cca695dec762fe7962859972fbd75e56

  • SHA512

    afd4ea1986da088c3f4c2757baeb4b21b14bd4b5e22e00260eca7e719c8fc78d803443b9dfc457799ab7b2d7d306395fbd48bf9d1bde260106a7ad3038c93d97

  • SSDEEP

    49152:9wREDDM04bCaLjmFy1nOFPG/3E1/4BtkMgHeXDREnz+d:9wREsbCaLaeO2EJSkTs0+d

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe
    "C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2052
    • C:\Users\Admin\AppData\Local\Temp\is-NSSG9.tmp\41589419116464448286035679864158972845276735013687.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-NSSG9.tmp\41589419116464448286035679864158972845276735013687.tmp" /SL5="$40150,1880700,795136,C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2968
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C timeout /T 3 & "C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe" /VERYSILENT /SUPPRESSMSGBOXES
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3032
        • C:\Windows\SysWOW64\timeout.exe
          timeout /T 3
          4⤵
          • System Location Discovery: System Language Discovery
          • Delays execution with timeout.exe
          PID:1280
        • C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe
          "C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe" /VERYSILENT /SUPPRESSMSGBOXES
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2108
          • C:\Users\Admin\AppData\Local\Temp\is-K3LS0.tmp\41589419116464448286035679864158972845276735013687.tmp
            "C:\Users\Admin\AppData\Local\Temp\is-K3LS0.tmp\41589419116464448286035679864158972845276735013687.tmp" /SL5="$301D8,1880700,795136,C:\Users\Admin\AppData\Local\Temp\41589419116464448286035679864158972845276735013687.exe" /VERYSILENT /SUPPRESSMSGBOXES
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of WriteProcessMemory
            PID:2700
            • C:\Windows\SysWOW64\regsvr32.exe
              "regsvr32.exe" /s /i:INSTALL "C:\Users\Admin\AppData\Roaming\\CluelessStork.dll"
              6⤵
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              PID:2740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\CluelessStork.dll

    Filesize

    2.8MB

    MD5

    5d12e174483a3ffe2c2c500e307fdc8a

    SHA1

    b32a8018e88633775bb9b6bd708ddce03699de37

    SHA256

    2ae1ba32a40756b38d7544aff09b77e72c6cffdcaf05758fa7d3edd2d9b21f56

    SHA512

    27453a456b36b8ad018dc8801cb28f08da89acc2c99b7f76f199ef9694f350810bfd404eda650e3eb889c9a7cf41e2117c66d30efb26ecfa80c094f353f4183e

  • \Users\Admin\AppData\Local\Temp\is-NSSG9.tmp\41589419116464448286035679864158972845276735013687.tmp

    Filesize

    3.1MB

    MD5

    e97363b64f37ee24cdd55cea14d1c564

    SHA1

    dd82ae5ebf33348011b0437fe8107d4d72b9e2b9

    SHA256

    ade1473799360f3df1cb0f8f20fa99e325009fb53e151236d0a2be6f041a8c8c

    SHA512

    362bdf700ddd9186e9207351f0b8879f303c8c669b4bea2327ba549e18f7a333e11f4dc07cc2721ac18fdcdee04a8362ae6b4cdbdc961d220e154fa6de32182b

  • memory/2052-0-0x0000000000D00000-0x0000000000DD0000-memory.dmp

    Filesize

    832KB

  • memory/2052-2-0x0000000000D01000-0x0000000000DA9000-memory.dmp

    Filesize

    672KB

  • memory/2052-31-0x0000000000D00000-0x0000000000DD0000-memory.dmp

    Filesize

    832KB

  • memory/2108-10-0x0000000000D00000-0x0000000000DD0000-memory.dmp

    Filesize

    832KB

  • memory/2108-26-0x0000000000D00000-0x0000000000DD0000-memory.dmp

    Filesize

    832KB

  • memory/2700-25-0x0000000000D20000-0x000000000104F000-memory.dmp

    Filesize

    3.2MB

  • memory/2968-8-0x0000000000090000-0x0000000000091000-memory.dmp

    Filesize

    4KB

  • memory/2968-27-0x0000000000DE0000-0x000000000110F000-memory.dmp

    Filesize

    3.2MB