Analysis

  • max time kernel
    147s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 03:50

General

  • Target

    f65b25f3aafc048b68ede890b83367d8b67dd024d5463244a8d341abef7c0cb8.exe

  • Size

    10.5MB

  • MD5

    45c679d5074f022c80fa610f7f7e22af

  • SHA1

    5f4d48fc9e058c1b38daa538a98bc75d43f60f03

  • SHA256

    f65b25f3aafc048b68ede890b83367d8b67dd024d5463244a8d341abef7c0cb8

  • SHA512

    857d1f3a8406de0f0b65178b6608cf5f00dc4ea4191c2af36504a1350ce6e7022a5c2dc5da7615c2915d3a6f70172d370e6d1d62a571eaadc7b84ffea137c0b6

  • SSDEEP

    196608:Z/n+n5bgRy4Zwvq2a8aRTIbWvFBCFvqnVNtKIr2oystKpH4E1Y5QJ1RvF6YVZofP:Z/n+5bgRy4ZreaKbqBCqw62oe54ESw14

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 16 IoCs
  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 51 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f65b25f3aafc048b68ede890b83367d8b67dd024d5463244a8d341abef7c0cb8.exe
    "C:\Users\Admin\AppData\Local\Temp\f65b25f3aafc048b68ede890b83367d8b67dd024d5463244a8d341abef7c0cb8.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2108
    • C:\Users\Admin\AppData\Local\Temp\is-4QVHA.tmp\f65b25f3aafc048b68ede890b83367d8b67dd024d5463244a8d341abef7c0cb8.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-4QVHA.tmp\f65b25f3aafc048b68ede890b83367d8b67dd024d5463244a8d341abef7c0cb8.tmp" /SL5="$4010A,10588883,201216,C:\Users\Admin\AppData\Local\Temp\f65b25f3aafc048b68ede890b83367d8b67dd024d5463244a8d341abef7c0cb8.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Users\Admin\AppData\Local\Temp\f65b25f3aafc048b68ede890b83367d8b67dd024d5463244a8d341abef7c0cb8.exe
        "C:\Users\Admin\AppData\Local\Temp\f65b25f3aafc048b68ede890b83367d8b67dd024d5463244a8d341abef7c0cb8.exe" /verysilent /password=3ckn8
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2420
        • C:\Users\Admin\AppData\Local\Temp\is-RNS5I.tmp\f65b25f3aafc048b68ede890b83367d8b67dd024d5463244a8d341abef7c0cb8.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-RNS5I.tmp\f65b25f3aafc048b68ede890b83367d8b67dd024d5463244a8d341abef7c0cb8.tmp" /SL5="$5010A,10588883,201216,C:\Users\Admin\AppData\Local\Temp\f65b25f3aafc048b68ede890b83367d8b67dd024d5463244a8d341abef7c0cb8.exe" /verysilent /password=3ckn8
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:344
          • C:\Windows\SysWOW64\msiexec.exe
            "msiexec.exe" -i "C:\Users\Admin\AppData\Local\Temp\is-Q8QFI.tmp\apphost.msi" -qn
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2800
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2704
    • C:\Windows\syswow64\MsiExec.exe
      C:\Windows\syswow64\MsiExec.exe -Embedding 241BF35EB13463F5FC76C0DCAD6AAA4D
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2840
    • C:\Users\Admin\AppData\Local\programs\NETCore\native\apphost.exe
      "C:\Users\Admin\AppData\Local\programs\NETCore\native\apphost.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Config.Msi\f769c63.rbs

    Filesize

    2KB

    MD5

    ac964bd336a05f47b5e86f17b57b1495

    SHA1

    bca48084f76f7bf73ac13b15b99834948fb35969

    SHA256

    0501e5bb832f2368d8675337d0f8a1ce463bca59d8f33fa05d1299d5068526ca

    SHA512

    191f34abb64daaf60b52b824462c3d7ca38ffee553f086c24c61a1af07a366a10229f1833f9127b1d0f5713de83aed3bdc6719813114e26aa718965e829687ba

  • C:\Users\Admin\AppData\Local\Programs\NETCore\native\apphost.exe

    Filesize

    8.6MB

    MD5

    679368412fd482fe978a21313d2a89c5

    SHA1

    6267e3e28881a462d91ec8e558d2988ef8030b6b

    SHA256

    beffe9a402b7721009674866ad773008c90b6af543973abdfb81391af4eb7146

    SHA512

    2f730f6d77d951ede98653b362f8affa331588bf21a60539a60eee23d912ec5d73ca2a05b69e7e7c047b2c264b8b2c260b4f866515238ffbc2b60a1c11b6270c

  • C:\Users\Admin\AppData\Local\Temp\is-4QVHA.tmp\f65b25f3aafc048b68ede890b83367d8b67dd024d5463244a8d341abef7c0cb8.tmp

    Filesize

    1.2MB

    MD5

    8724a748abb447dad6773d96d955c4c4

    SHA1

    e4c3285de7a39ef83413b4e431cc544c1573a191

    SHA256

    579a01f35ba4474b06471d5649662398a7b21ee5e94f3a5b98e65847cbffe073

    SHA512

    dc8a75c9b951cc354bdb0566044b3cb5d0df36a219c75c296af694f44f1ce99054f1104e96553eccc6da56bc60c5f28dcb030fdde0cd49f5097dc024fecb4e39

  • C:\Users\Admin\AppData\Local\Temp\is-Q8QFI.tmp\apphost.msi

    Filesize

    10.7MB

    MD5

    048072f41d9d0fc448c86608834896e1

    SHA1

    5973b931ff177141d432cc84440b1133f980c326

    SHA256

    1168dc4fe524fa0c40ca40723ac909408d3e28b356f3c9f5c6e629454386d109

    SHA512

    34f2fffb5956319af796072150d7437c449c80284f29f5e633502146a9248d1125741100e17411b72b29ccdc23dcda953ca931ec283d10d6d34eb9844e17316b

  • C:\Users\Admin\AppData\Local\programs\NETCore\native\config.ini

    Filesize

    592B

    MD5

    d0194a86163e4edc6df8d7d18e05e94f

    SHA1

    a6fa3081d4b52ad403cb7e6328323145f825db9d

    SHA256

    bf98bf21fe2e415b0ddcfca143f1470672a621e0b6bf6688c66e0ea32fc38f26

    SHA512

    332dfcb032304b027ba71e9e2f61d828834ee18aca9bd36b3774ee9187550b0b760d2ec9bd55d7bb05c38aa4ea27156dcd56abb302d487dad24cc37338d9856a

  • C:\Users\Admin\AppData\Local\programs\NETCore\native\eng.lng

    Filesize

    41KB

    MD5

    a210c2a3609b1c03df6d0219f74fc543

    SHA1

    78888e250c8af963268ebc467319d71a5061db6b

    SHA256

    3a968020e1532ecaffaef3be8f15b6ecbac3d58d129eb92511deca6904d215f5

    SHA512

    7e866eb3aa958d0ba2132044d7569ac97b20d712372b7343215f8383400231a12b502437a5984f376c81e50aa88b56037767514f94cd33f582b6b5c479f70ed5

  • C:\Users\Admin\AppData\Local\programs\NETCore\native\hcezp.bmp

    Filesize

    7KB

    MD5

    71769872777244eb17aee00d2a3d7dc9

    SHA1

    d207a737fa58955cefa816d071c920208cc24cce

    SHA256

    ae8516f1f2e78a669642f0f61b82ee2041f6d5297ec2f08b2b4f19ef4ce1c201

    SHA512

    62d6e04654fe15361b7635aca8d54d8fa08ab59c14247d9e7a36299fb7b70f3a9563a3401f9d68136485c5ab6507a5ccaeb04756d260661d7be5bd89a46c6485

  • C:\Users\Admin\AppData\Local\programs\NETCore\native\libcrypto-1_1.dll

    Filesize

    3.0MB

    MD5

    df54355a82c6ce8fdfc02e1b227410ab

    SHA1

    2e9134150f83eda3a55b7dd73d5faf6bfa9de132

    SHA256

    06d30d8a77bf336c16d50a9c9fbf64dccdda5f4e1f6146f7741cecd5492031d3

    SHA512

    29b0c47dee5a8397b3e4f4e322fed2be60937817a9bc931ba77885bbc2f196bc492cceed8f6eb2706ff4c69c3fdf0a01d2682e2c5d0ec05af21511f3af5b5aad

  • C:\Users\Admin\AppData\Local\programs\NETCore\native\libcurl.dll

    Filesize

    534KB

    MD5

    13cd45df8aaa584ebd2a40ede76f1e06

    SHA1

    baa19e6a965621cb315e5f866edc179ef1d6b863

    SHA256

    3ff4e80e327f298a11e116a517be0963a0b3cd376a6a624caffacd586e6b1449

    SHA512

    285d7265ac05cecdd43650e5def9198b5f2f4d63665739baa059598e41f4ce892248d3ca7e793ac274dc05b4c19cfa11c17faea62fc1e3495c94a03851049328

  • C:\Users\Admin\AppData\Local\programs\NETCore\native\libssl-1_1.dll

    Filesize

    925KB

    MD5

    cbefd9f5e05bbf57aed04b098e6f499f

    SHA1

    cbac40bfc062e7aa2befcb91687930bab9c4d241

    SHA256

    e07a95378815fbfc3b2ed21bcae5ba43106a4929273f9bbcc26eff437a3c9ab8

    SHA512

    3d0c320683e90f66a9b76613cfc84af87422fb5eee2375e918c63642b7e72faa70a6383b6e43e565d6bbeec4c8060062000bd40321165fc4b5ede8b213bda049

  • C:\Users\Admin\AppData\Local\programs\NETCore\native\xul8uq.cfg

    Filesize

    33B

    MD5

    8268bd37b7ba7a0b39361e2e74e5e6cf

    SHA1

    18d2a246b888158a4a954a7c2a85ffae2ba32ae9

    SHA256

    a2d8bf26137e8076dc075a5b325416599803b1ba3fa887e21593edca89d0ecc7

    SHA512

    020b334700d11456c624c84f26aef1ff0fb6e177c8c378531d4d856f696d0874f3bdae41df2be8440c20a5f4db9f31246d8111ddd9dee2b969ec5603c9439547

  • C:\Windows\Installer\MSI9DA6.tmp

    Filesize

    584KB

    MD5

    8e565fd81ca10a65cc02e7901a78c95b

    SHA1

    1bca3979c233321ae527d4508cfe9b3ba825dbd3

    SHA256

    7b64112c2c534203bb59ce1a9b7d5390448c045dda424fb3cfd5878edb262016

    SHA512

    144bde89eba469b32b59f30e7f4d451329c541ed7b556bc60d118c9e2e5cdf148c2275cca51c4b9355686aefa16a4b86a26d4c8fe0dd2cf318b979863109592e

  • \Users\Admin\AppData\Local\Programs\NETCore\native\AstCrp.dll

    Filesize

    171KB

    MD5

    dbb4bccfe8fee299d555a19865c41921

    SHA1

    a6c494854ca8bec80c05e259a9d8d9346ec61786

    SHA256

    45e87d7421b6b65c207e8d564a4e54dcdab7b104b83341f63d348f8894bde992

    SHA512

    5b5b6091655801c984e87a5de4b8c3771b7ff8a069206662650ba652711db48a4912a613015c2254215ccbd252c475c4a4f00efcb1e0dfb404c6736746a187a4

  • \Users\Admin\AppData\Local\Programs\NETCore\native\SHFolder.dll

    Filesize

    28KB

    MD5

    06c190cf1e01a85d2a42855ef4450bee

    SHA1

    bbfb006fcf9137740b9fdb3ec2a0bff17ba5962e

    SHA256

    b16a939e056344fe9012601e4d445061c7bf58b6121b56fe3c36122b2ebd8355

    SHA512

    2114bee20a054fdad7b43663991c4210648f908329922f042b1d8ce60bd701691238b337e788afe3f4e300b18f1c1a97c88ff1d3634ae848e8d25456ed98c159

  • \Users\Admin\AppData\Local\Programs\NETCore\native\astclient.dll

    Filesize

    675KB

    MD5

    7bf95a14483346eae890e6f4354c74a8

    SHA1

    7de11b13cfe609d454bdd1393ed3d79a127c1b7c

    SHA256

    719f267e41c95e36f99f5da0b9d5d70054d3e9c16e99fb1122948382b976d614

    SHA512

    ef8b24e6079f05b3f1253e4487e1426639ceb5c1e13ca80046debd224353280e921ea765958f5b3f564983992a294e0242fd7bf4753cce24c51caa86557b51fe

  • \Users\Admin\AppData\Local\Programs\NETCore\native\astrct.dll

    Filesize

    1.7MB

    MD5

    59b0561cc13e47a3d7be7947e9b8a4cf

    SHA1

    172663ab62e420cbd46983f5dfacac3b550cdb4f

    SHA256

    e12baf2c64aed23a6d324fd553d5722e5d5d03d50676a0afe97c4090df3cb7c2

    SHA512

    35d3a4739176c81c5e339c5b64411cd0cbb24b2343792e2af302a585b984c158140a20050fd8015a4d49c2a69bbd31aad82a4f58e8279611ec262499dab6bd41

  • \Users\Admin\AppData\Local\Programs\NETCore\native\hatls.dll

    Filesize

    2.1MB

    MD5

    bccf6a5c2595eea84533692bb788d8bb

    SHA1

    24318226f145e52b7633a4e9e844d6ead43b75ac

    SHA256

    abf75de674428e112f90f1c618218ff73ef851f4f09c5f5ba8b69e79a6c74dbf

    SHA512

    78f24f0812aae31e83340adeb1a1ae8c00edfdf483e299706f863cb713bfdc2501b5418ce8f8bd9131e3c704bffb58a8ca05c5e0a75eb19f15e0409c5b74e35b

  • \Users\Admin\AppData\Local\Programs\NETCore\native\sqlite3.dll

    Filesize

    815KB

    MD5

    c7f02a62ec2be3e345917640fd9e7502

    SHA1

    828f4df3e2ad0c8b04b06cecb0c539391ba09704

    SHA256

    8e85d370cc83174d34d0d6fd9153c37bb184dc9347e5a3bbfc692f9ded7be520

    SHA512

    d3c33df3e7e06bd2beb638a4e17703498cb49da0ce958beaf268784d802bf6069eac236deb0049b6d5b5b1ba252d15a3a0a4e8585730dc69c4604a88f9d38f8a

  • \Users\Admin\AppData\Local\Temp\is-59106.tmp\_isetup\_iscrypt.dll

    Filesize

    2KB

    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • memory/324-107-0x0000000071E90000-0x000000007217E000-memory.dmp

    Filesize

    2.9MB

  • memory/324-135-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-162-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-80-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-159-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-156-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-153-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-150-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-147-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-144-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-116-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-119-0x0000000061E00000-0x0000000061EB8000-memory.dmp

    Filesize

    736KB

  • memory/324-118-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-117-0x0000000000400000-0x0000000000D04000-memory.dmp

    Filesize

    9.0MB

  • memory/324-120-0x0000000071E90000-0x000000007217E000-memory.dmp

    Filesize

    2.9MB

  • memory/324-122-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-125-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-128-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-131-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/324-141-0x0000000007000000-0x000000000700C000-memory.dmp

    Filesize

    48KB

  • memory/344-96-0x0000000000400000-0x0000000000540000-memory.dmp

    Filesize

    1.2MB

  • memory/1644-9-0x0000000000400000-0x0000000000540000-memory.dmp

    Filesize

    1.2MB

  • memory/1644-18-0x0000000000400000-0x0000000000540000-memory.dmp

    Filesize

    1.2MB

  • memory/2108-2-0x0000000000401000-0x0000000000412000-memory.dmp

    Filesize

    68KB

  • memory/2108-20-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2108-0-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2420-98-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/2420-15-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB