Resubmissions

19/11/2024, 13:19

241119-qkv8haxcmm 7

19/11/2024, 13:16

241119-qhw21swemh 7

Analysis

  • max time kernel
    49s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 13:16

General

  • Target

    Mm2 DupIicator.zip

  • Size

    473KB

  • MD5

    e5f53cfdc72970e29af638c784499577

  • SHA1

    4c2a9b4f14b49ec14c8fbd0c98f3a515c341980f

  • SHA256

    2579147ede0b7467f22818265fa56d049f24b1c6f5120a7ea04f3308346ddcc7

  • SHA512

    cc0d0f4f1fd46a97d19a44cd6ffb0f3f1beea2db03d9489db485f9ba24e03730015df87c2b46c9a04d2941c0eb5b80ef73439a89130a9978c83962e587cd7ee7

  • SSDEEP

    12288:0IsA9Wt8Q7geM2cTlZi3dGwMA3Brr5gBK2k2uy:0XA928oVelZi3dGwHRrW82k2D

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Mm2 DupIicator.zip"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2044
    • C:\Users\Admin\AppData\Local\Temp\7zOCF7ECC07\Mm2 DupIicator.exe
      "C:\Users\Admin\AppData\Local\Temp\7zOCF7ECC07\Mm2 DupIicator.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2696
    • C:\Windows\system32\NOTEPAD.EXE
      "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\7zOCF730077\ReadMe.txt
      2⤵
      • Opens file in notepad (likely ransom note)
      PID:2888
    • C:\Users\Admin\AppData\Local\Temp\7zOCF73F4B7\Mm2 DupIicator.exe
      "C:\Users\Admin\AppData\Local\Temp\7zOCF73F4B7\Mm2 DupIicator.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2608 -s 648
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2660

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\7zOCF730077\ReadMe.txt

    Filesize

    989B

    MD5

    359903bcbedb9c7f9c69603171a59259

    SHA1

    31f85becf2aba7b27cc92da72328885b34c385af

    SHA256

    fe9afe598e78c913faca44e26d6616936d267e1e984d2e1b8630ef68600889ec

    SHA512

    abad060e2908caacb22461f30617d8995b56a042514873745d6fb9b783f50d26384ce93edd74e4481e6f007cbd494eb463e42cb0141383e32f8df880b6f9ebf1

  • C:\Users\Admin\AppData\Local\Temp\7zOCF7ECC07\Mm2 DupIicator.exe

    Filesize

    503KB

    MD5

    ff5d323adad04c55fec71e9c6d24dfd4

    SHA1

    ed2e9e4e286c48057b13404327ff56176e757332

    SHA256

    ce00f04545c1e0b7a19aeba3d9846f9987aa963e582157ef9314457ffb5b6e16

    SHA512

    8715d38217c465d9dfae9adeec96d387d3b6f2d00e89cef775e970ac6380a0b6739bb5b5320fea98311f29b3630cdc4599fd8c3d80502a13c59a5cc0608ab64c

  • \Users\Admin\AppData\Roaming\gdi32.dll

    Filesize

    421KB

    MD5

    5347650d008cf15cf6b8294d7ab240d3

    SHA1

    12d65a40c4893e4cb58cbfe7c27d082e09580fa3

    SHA256

    58c667c831308ab94b9a5962532dc7acf831e3cf1492d174b667afc542bafbd5

    SHA512

    7ee8b468d5e7f21ff9b627b3d3e3f88e53d88f95da46dc6fbb273cdf774271fbf4e80d98d50ed9433641188cc6eb09664f10e6fd34f5e4cb67eeeb86cc8f2812

  • memory/2608-33-0x0000000000240000-0x00000000002C6000-memory.dmp

    Filesize

    536KB

  • memory/2696-12-0x0000000000B70000-0x0000000000BF6000-memory.dmp

    Filesize

    536KB

  • memory/2696-13-0x0000000000350000-0x0000000000356000-memory.dmp

    Filesize

    24KB