Analysis
-
max time kernel
49s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 13:16
Static task
static1
Behavioral task
behavioral1
Sample
Mm2 DupIicator.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Mm2 DupIicator.zip
Resource
win10v2004-20241007-en
General
-
Target
Mm2 DupIicator.zip
-
Size
473KB
-
MD5
e5f53cfdc72970e29af638c784499577
-
SHA1
4c2a9b4f14b49ec14c8fbd0c98f3a515c341980f
-
SHA256
2579147ede0b7467f22818265fa56d049f24b1c6f5120a7ea04f3308346ddcc7
-
SHA512
cc0d0f4f1fd46a97d19a44cd6ffb0f3f1beea2db03d9489db485f9ba24e03730015df87c2b46c9a04d2941c0eb5b80ef73439a89130a9978c83962e587cd7ee7
-
SSDEEP
12288:0IsA9Wt8Q7geM2cTlZi3dGwMA3Brr5gBK2k2uy:0XA928oVelZi3dGwHRrW82k2D
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2696 Mm2 DupIicator.exe 2608 Mm2 DupIicator.exe -
Loads dropped DLL 6 IoCs
pid Process 2696 Mm2 DupIicator.exe 2660 WerFault.exe 2660 WerFault.exe 2660 WerFault.exe 2660 WerFault.exe 2660 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2660 2608 WerFault.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mm2 DupIicator.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Mm2 DupIicator.exe -
Opens file in notepad (likely ransom note) 1 IoCs
pid Process 2888 NOTEPAD.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2044 7zFM.exe 2044 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2044 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeRestorePrivilege 2044 7zFM.exe Token: 35 2044 7zFM.exe Token: SeSecurityPrivilege 2044 7zFM.exe Token: SeSecurityPrivilege 2044 7zFM.exe Token: SeSecurityPrivilege 2044 7zFM.exe Token: SeSecurityPrivilege 2044 7zFM.exe Token: SeSecurityPrivilege 2044 7zFM.exe -
Suspicious use of FindShellTrayWindow 7 IoCs
pid Process 2044 7zFM.exe 2044 7zFM.exe 2044 7zFM.exe 2044 7zFM.exe 2044 7zFM.exe 2044 7zFM.exe 2044 7zFM.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2696 2044 7zFM.exe 31 PID 2044 wrote to memory of 2696 2044 7zFM.exe 31 PID 2044 wrote to memory of 2696 2044 7zFM.exe 31 PID 2044 wrote to memory of 2696 2044 7zFM.exe 31 PID 2044 wrote to memory of 2888 2044 7zFM.exe 33 PID 2044 wrote to memory of 2888 2044 7zFM.exe 33 PID 2044 wrote to memory of 2888 2044 7zFM.exe 33 PID 2044 wrote to memory of 2608 2044 7zFM.exe 34 PID 2044 wrote to memory of 2608 2044 7zFM.exe 34 PID 2044 wrote to memory of 2608 2044 7zFM.exe 34 PID 2044 wrote to memory of 2608 2044 7zFM.exe 34 PID 2608 wrote to memory of 2660 2608 Mm2 DupIicator.exe 36 PID 2608 wrote to memory of 2660 2608 Mm2 DupIicator.exe 36 PID 2608 wrote to memory of 2660 2608 Mm2 DupIicator.exe 36 PID 2608 wrote to memory of 2660 2608 Mm2 DupIicator.exe 36
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Mm2 DupIicator.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\7zOCF7ECC07\Mm2 DupIicator.exe"C:\Users\Admin\AppData\Local\Temp\7zOCF7ECC07\Mm2 DupIicator.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zOCF730077\ReadMe.txt2⤵
- Opens file in notepad (likely ransom note)
PID:2888
-
-
C:\Users\Admin\AppData\Local\Temp\7zOCF73F4B7\Mm2 DupIicator.exe"C:\Users\Admin\AppData\Local\Temp\7zOCF73F4B7\Mm2 DupIicator.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 6483⤵
- Loads dropped DLL
- Program crash
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
989B
MD5359903bcbedb9c7f9c69603171a59259
SHA131f85becf2aba7b27cc92da72328885b34c385af
SHA256fe9afe598e78c913faca44e26d6616936d267e1e984d2e1b8630ef68600889ec
SHA512abad060e2908caacb22461f30617d8995b56a042514873745d6fb9b783f50d26384ce93edd74e4481e6f007cbd494eb463e42cb0141383e32f8df880b6f9ebf1
-
Filesize
503KB
MD5ff5d323adad04c55fec71e9c6d24dfd4
SHA1ed2e9e4e286c48057b13404327ff56176e757332
SHA256ce00f04545c1e0b7a19aeba3d9846f9987aa963e582157ef9314457ffb5b6e16
SHA5128715d38217c465d9dfae9adeec96d387d3b6f2d00e89cef775e970ac6380a0b6739bb5b5320fea98311f29b3630cdc4599fd8c3d80502a13c59a5cc0608ab64c
-
Filesize
421KB
MD55347650d008cf15cf6b8294d7ab240d3
SHA112d65a40c4893e4cb58cbfe7c27d082e09580fa3
SHA25658c667c831308ab94b9a5962532dc7acf831e3cf1492d174b667afc542bafbd5
SHA5127ee8b468d5e7f21ff9b627b3d3e3f88e53d88f95da46dc6fbb273cdf774271fbf4e80d98d50ed9433641188cc6eb09664f10e6fd34f5e4cb67eeeb86cc8f2812