Analysis

  • max time kernel
    9s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20/11/2024, 04:58

General

  • Target

    db85a694365d94758f7e657860e61727fc52f8571bc534c6baa5ad8432220ca7N.exe

  • Size

    591KB

  • MD5

    20a0ece635cda9c4f4484ed8e15ef130

  • SHA1

    d15518b0730110d94f34e128be490e19545bb318

  • SHA256

    db85a694365d94758f7e657860e61727fc52f8571bc534c6baa5ad8432220ca7

  • SHA512

    ca8ed9a873bc5a45c593121b726078ca7971881c358b58b14e9f1d8c96cae7b34a15851e034a3664ec8d765361a451896fd9ba50047d9fa2dafe19f879431567

  • SSDEEP

    6144:WcNhJgX9z0f57STB0YRX8npzU66bkWmchVySqkvAH3qo0wWJC6G/SMT4FWqC7:phJ6mfBSTOYREtU66b5zhVymA/XSRhy

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db85a694365d94758f7e657860e61727fc52f8571bc534c6baa5ad8432220ca7N.exe
    "C:\Users\Admin\AppData\Local\Temp\db85a694365d94758f7e657860e61727fc52f8571bc534c6baa5ad8432220ca7N.exe"
    1⤵
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\WINDOWS\MSWDM.EXE
      "C:\WINDOWS\MSWDM.EXE"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:2516
    • C:\WINDOWS\MSWDM.EXE
      -r!C:\Windows\devD44F.tmp!C:\Users\Admin\AppData\Local\Temp\db85a694365d94758f7e657860e61727fc52f8571bc534c6baa5ad8432220ca7N.exe! !
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2608
      • C:\Users\Admin\AppData\Local\Temp\DB85A694365D94758F7E657860E61727FC52F8571BC534C6BAA5AD8432220CA7N.EXE
        3⤵
        • Executes dropped EXE
        PID:1228
      • C:\WINDOWS\MSWDM.EXE
        -e!C:\Windows\devD44F.tmp!C:\Users\Admin\AppData\Local\Temp\DB85A694365D94758F7E657860E61727FC52F8571BC534C6BAA5AD8432220CA7N.EXE!
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:2208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\MSWDM.EXE

    Filesize

    256KB

    MD5

    16a243b85f60d6da5f8cf544c196f96f

    SHA1

    6963a9ab685755e8ac10d0d6c300ad8b7963f2ac

    SHA256

    b580e3621992cfcf6701b16d94ee759d935957c459d51a53672a893f9c199b83

    SHA512

    7a1bb138b760bfced490c51d22a6838dd8947cd1038825514a96d340a437c7e7425e54334bf006062bf2c46282760bf019adcecfcd4e8842744db5c358f10d1a

  • C:\Windows\devD44F.tmp

    Filesize

    335KB

    MD5

    40ac62c087648ccc2c58dae066d34c98

    SHA1

    0e87efb6ddfe59e534ea9e829cad35be8563e5f7

    SHA256

    482c4c1562490e164d5f17990253373691aa5eab55a81c7f890fe9583a9ea916

    SHA512

    0c1ff13ff88409d54fee2ceb07fe65135ce2a9aa6f8da51ac0158abb2cfbb3a898ef26f476931986f1367622f21a7c0b0e742d0f4de8be6e215596b0d88c518f