Analysis

  • max time kernel
    141s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 14:15

General

  • Target

    3.exe

  • Size

    27.7MB

  • MD5

    e516566b25ae853edd6aad00854d782a

  • SHA1

    868bc5e3b851337eb9094de303e395fc5be8d7ae

  • SHA256

    9cb2b6cafc2c6ec61d2f997789e7a923d71b8663f57a531820d958971f8a8e84

  • SHA512

    7b631df7d1786f901669869020430a2caa7b8fc493c5331a00137f60af0827e8c42638a89f1381aed2954bc0b280a1591a0561ba3aad5503f541d8ca12f466c5

  • SSDEEP

    393216:aT903qKSVL/D0mOWBLGZz1cVeN1zSuCK+RO4b61B2YpLlsmb2wIoV1Keejdnd:ah0OVL/rBLGp1JdCr6zRlsm1IoV1G9d

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3.exe
    "C:\Users\Admin\AppData\Local\Temp\3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\3.exe
      "C:\Users\Admin\AppData\Local\Temp\3.exe"
      2⤵
      • Checks BIOS information in registry
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Users\Admin\AppData\Local\Temp\3.exe
        "C:\Users\Admin\AppData\Local\Temp\3.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Users\Admin\AppData\Local\Temp\3.exe
          "C:\Users\Admin\AppData\Local\Temp\3.exe"
          4⤵
            PID:2388

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ColudP.s

      Filesize

      1B

      MD5

      c4ca4238a0b923820dcc509a6f75849b

      SHA1

      356a192b7913b04c54574d18c28d46e6395428ab

      SHA256

      6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

      SHA512

      4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

    • C:\Users\Admin\AppData\Local\Temp\Temp.dat

      Filesize

      4.5MB

      MD5

      9b77414cc34417bb9dd753e14e26ef49

      SHA1

      54cc4425f9656a19fcde9cb694ffff221f8b733f

      SHA256

      d0b0427a276b2506138bb4bc223e27eed7a33aeea7a7ac080b2ec85c5d950ffe

      SHA512

      d91ea43e40bc864c7587f9e5ec03ada8a7d027c4c393dfc6ca6f004b4cc89e8157a33672439020e2081a224c22840653dda4976a89d5378404cbae2b53ad9edc

    • memory/2388-76-0x0000000000400000-0x0000000000F24000-memory.dmp

      Filesize

      11.1MB

    • memory/2440-3-0x0000000010000000-0x0000000010B48000-memory.dmp

      Filesize

      11.3MB

    • memory/2440-4-0x0000000000230000-0x0000000000233000-memory.dmp

      Filesize

      12KB

    • memory/2440-2-0x0000000010000000-0x0000000010B48000-memory.dmp

      Filesize

      11.3MB

    • memory/2440-20-0x0000000010000000-0x0000000010B48000-memory.dmp

      Filesize

      11.3MB

    • memory/2440-33-0x0000000010000000-0x0000000010B48000-memory.dmp

      Filesize

      11.3MB

    • memory/2440-1-0x0000000000230000-0x0000000000233000-memory.dmp

      Filesize

      12KB

    • memory/2440-31-0x00000000085C0000-0x000000000B295000-memory.dmp

      Filesize

      44.8MB

    • memory/2440-0-0x0000000000400000-0x00000000030D5000-memory.dmp

      Filesize

      44.8MB

    • memory/2440-35-0x0000000000400000-0x00000000030D5000-memory.dmp

      Filesize

      44.8MB

    • memory/2580-70-0x0000000000400000-0x00000000030D5000-memory.dmp

      Filesize

      44.8MB

    • memory/2764-23-0x0000000003400000-0x0000000003BDF000-memory.dmp

      Filesize

      7.9MB

    • memory/2764-40-0x00000000030E0000-0x00000000033F2000-memory.dmp

      Filesize

      3.1MB

    • memory/2764-9-0x0000000003400000-0x0000000003BDF000-memory.dmp

      Filesize

      7.9MB

    • memory/2764-11-0x0000000003400000-0x0000000003BDF000-memory.dmp

      Filesize

      7.9MB

    • memory/2764-25-0x0000000003400000-0x0000000003BDF000-memory.dmp

      Filesize

      7.9MB

    • memory/2764-14-0x0000000003400000-0x0000000003BDF000-memory.dmp

      Filesize

      7.9MB

    • memory/2764-27-0x0000000003400000-0x0000000003BDF000-memory.dmp

      Filesize

      7.9MB

    • memory/2764-38-0x00000000030E0000-0x00000000033F2000-memory.dmp

      Filesize

      3.1MB

    • memory/2764-36-0x00000000030E0000-0x00000000033F2000-memory.dmp

      Filesize

      3.1MB

    • memory/2764-42-0x00000000030E0000-0x00000000033F2000-memory.dmp

      Filesize

      3.1MB

    • memory/2764-41-0x00000000030E0000-0x00000000033F2000-memory.dmp

      Filesize

      3.1MB

    • memory/2764-29-0x00000000001B0000-0x00000000001B1000-memory.dmp

      Filesize

      4KB

    • memory/2764-39-0x00000000030E0000-0x00000000033F2000-memory.dmp

      Filesize

      3.1MB

    • memory/2764-43-0x0000000000400000-0x0000000000F24000-memory.dmp

      Filesize

      11.1MB

    • memory/2764-17-0x0000000003400000-0x0000000003BDF000-memory.dmp

      Filesize

      7.9MB

    • memory/2764-46-0x0000000000400000-0x0000000000F24000-memory.dmp

      Filesize

      11.1MB

    • memory/2764-18-0x0000000003400000-0x0000000003BDF000-memory.dmp

      Filesize

      7.9MB

    • memory/2764-72-0x00000000030E0000-0x00000000033F2000-memory.dmp

      Filesize

      3.1MB

    • memory/2764-73-0x0000000000400000-0x0000000000F24000-memory.dmp

      Filesize

      11.1MB

    • memory/2764-75-0x00000000030E0000-0x00000000033F2000-memory.dmp

      Filesize

      3.1MB

    • memory/2764-21-0x0000000003400000-0x0000000003BDF000-memory.dmp

      Filesize

      7.9MB

    • memory/2764-7-0x00000000030E0000-0x00000000033F2000-memory.dmp

      Filesize

      3.1MB