Analysis

  • max time kernel
    148s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    19/11/2024, 17:58

General

  • Target

    b9c6547ac32afc2c422b3ad73807dc4c4f365ce452de62f89230d41399d67219.exe

  • Size

    2.0MB

  • MD5

    96b3148ff5cb0c016e4925cc264cbe87

  • SHA1

    80b84430acd5e5863e1622a5f8c3929d33988bea

  • SHA256

    b9c6547ac32afc2c422b3ad73807dc4c4f365ce452de62f89230d41399d67219

  • SHA512

    2676c40c14d75ef434cb8cd9ef725f4bec3f230796ceeb7e8a001c69d1ffcc29c8480a0f116fc5897ba6bf3e97d41f56cdb0848ecb8fdfda9b1baa24d6f77d4c

  • SSDEEP

    12288:CPv1EUs/8d7MN4LRRL/Lb6jQMpvsMfUFOdGuDsGaJ4XPH9h54LDQHtF4ADyfx6:CPKUs+7MN4r6jQMpvs3UdkGXPJc6

Malware Config

Signatures

  • ASPack v2.12-2.42 1 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • UPX packed file 7 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9c6547ac32afc2c422b3ad73807dc4c4f365ce452de62f89230d41399d67219.exe
    "C:\Users\Admin\AppData\Local\Temp\b9c6547ac32afc2c422b3ad73807dc4c4f365ce452de62f89230d41399d67219.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2316
    • F:\wchost.exe
      F:\wchost.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2728

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • F:\wchost.exe

    Filesize

    2.0MB

    MD5

    96b3148ff5cb0c016e4925cc264cbe87

    SHA1

    80b84430acd5e5863e1622a5f8c3929d33988bea

    SHA256

    b9c6547ac32afc2c422b3ad73807dc4c4f365ce452de62f89230d41399d67219

    SHA512

    2676c40c14d75ef434cb8cd9ef725f4bec3f230796ceeb7e8a001c69d1ffcc29c8480a0f116fc5897ba6bf3e97d41f56cdb0848ecb8fdfda9b1baa24d6f77d4c

  • memory/2316-11-0x0000000002A60000-0x0000000002EA3000-memory.dmp

    Filesize

    4.3MB

  • memory/2316-2-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/2316-4-0x00000000001C0000-0x00000000001CB000-memory.dmp

    Filesize

    44KB

  • memory/2316-3-0x00000000001C0000-0x00000000001CB000-memory.dmp

    Filesize

    44KB

  • memory/2316-1-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/2316-0-0x0000000000400000-0x0000000000843000-memory.dmp

    Filesize

    4.3MB

  • memory/2316-19-0x0000000000400000-0x0000000000843000-memory.dmp

    Filesize

    4.3MB

  • memory/2316-16-0x0000000002A60000-0x0000000002EA3000-memory.dmp

    Filesize

    4.3MB

  • memory/2728-12-0x0000000000400000-0x0000000000843000-memory.dmp

    Filesize

    4.3MB

  • memory/2728-14-0x0000000000230000-0x000000000023B000-memory.dmp

    Filesize

    44KB

  • memory/2728-18-0x0000000010000000-0x000000001001E000-memory.dmp

    Filesize

    120KB

  • memory/2728-17-0x0000000000230000-0x000000000023B000-memory.dmp

    Filesize

    44KB

  • memory/2728-20-0x0000000000400000-0x0000000000843000-memory.dmp

    Filesize

    4.3MB