Analysis

  • max time kernel
    16s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 07:54

General

  • Target

    4d18d869f2a9387b924adcd9b2401ce866173726e9d1fd8044ca50969637a1ab.exe

  • Size

    2.0MB

  • MD5

    067b317490fc872a288aed3f2c67b99b

  • SHA1

    8672c8dc58f00d934f906daf7a137851c0195ca7

  • SHA256

    4d18d869f2a9387b924adcd9b2401ce866173726e9d1fd8044ca50969637a1ab

  • SHA512

    cb62dac1800f6a11afa1bd42429ed150e5712521070cd3830dd3114ee412b714f05e6bb9864a0701ca61eeecd72bb3afeb2d56d506887fdd176ea0c457cb3cc3

  • SSDEEP

    49152:HSYjJ7xCzo1Be1IbLKtBvxApb3l6IWSRt7eFS:HbjJAGqIbLKtDApbnWzS

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 7 IoCs
  • Drops file in Program Files directory 30 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4d18d869f2a9387b924adcd9b2401ce866173726e9d1fd8044ca50969637a1ab.exe
    "C:\Users\Admin\AppData\Local\Temp\4d18d869f2a9387b924adcd9b2401ce866173726e9d1fd8044ca50969637a1ab.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /IM WebActiveEXE.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2540
    • C:\Windows\SysWOW64\TASKKILL.exe
      TASKKILL /F /IM TimeGridEXE.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2684
    • C:\Program Files (x86)\webrec\WEB30\WebPlugin\WebActiveEXE.exe
      "C:\Program Files (x86)\webrec\WEB30\WebPlugin\WebActiveEXE.exe" /regserver
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2464
    • C:\Program Files (x86)\webrec\WEB30\WebPlugin\TimeGridEXE.exe
      "C:\Program Files (x86)\webrec\WEB30\WebPlugin\TimeGridEXE.exe" /regserver
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      PID:2940
    • C:\Windows\SysWOW64\regsvr32.exe
      regsvr32 /s "atl.dll"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:1100

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\webrec\WEB30\WebPlugin\timeAxesDll.dll

    Filesize

    96KB

    MD5

    825dc2631c7aa04e9bc90e0d898bccb9

    SHA1

    304d5d58af32e5abcbddd0646cd51b56af456639

    SHA256

    c5cd912f4afb6411156a0fbaf278d426f3f49b34a2b9489cc8b1a0e57532ba5c

    SHA512

    4c98386e5f537ef1b420cb282965606f0467e2296784a37bd97b82dd3dc8308e1531cbb78faf5f858ef6ed18cdc9500a31e9f5c5b66c7692403a005285f74ca9

  • \Program Files (x86)\webrec\WEB30\WebPlugin\TimeGridEXE.exe

    Filesize

    52KB

    MD5

    b123dcf214fb8277b805a4b279cae541

    SHA1

    b81b7854b2b01fdd7086f9af1d6f64c0316e538c

    SHA256

    5c4186032aab6e0cb5b1a960adc17aef7b91e919b53c7e13e17c0b884fa26956

    SHA512

    1299d6f566de5f7119a4d8fde6e61bdcd58dec3177a9419967e6f64ad43bb24c3be4bcb06a6773de1cbab6ca8b2880a61f1ae0e200e851fc6adaba25050845ee

  • \Program Files (x86)\webrec\WEB30\WebPlugin\WebActiveEXE.exe

    Filesize

    148KB

    MD5

    719c1569480a699a9a93db0eb31062ba

    SHA1

    41cdab9f555fd25cd10e8ac35890d2d14145750f

    SHA256

    48f90f293fd1ef34984c56dce271c238e2316e2913adaaac66b13269e9525364

    SHA512

    0c5b463d053d68f236916a8625c4e36762e6292ec6cd6db8a9c5f3ceeed41b795eb0e3a974797db93b6e5243331418886bf828a73bac0028b49fad57bc01a42c

  • \Users\Admin\AppData\Local\Temp\nso6F0A.tmp\nsExec.dll

    Filesize

    6KB

    MD5

    acc2b699edfea5bf5aae45aba3a41e96

    SHA1

    d2accf4d494e43ceb2cff69abe4dd17147d29cc2

    SHA256

    168a974eaa3f588d759db3f47c1a9fdc3494ba1fa1a73a84e5e3b2a4d58abd7e

    SHA512

    e29ea10ada98c71a18273b04f44f385b120d4e8473e441ce5748cfa44a23648814f2656f429b85440157988c88de776c6ac008dc38bf09cbb746c230a46c69fe