Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 09:04

General

  • Target

    25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe

  • Size

    2.0MB

  • MD5

    dff50956be43d791baf2f61bc96a56dd

  • SHA1

    ca6fa6de7bf577100cf1a0aa34dea5b30d49c9ba

  • SHA256

    25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3

  • SHA512

    ff66a8025e069c327a6e0993a033d821dad74e3af7835402b0bfa8a4067eb0090450a54030dcf483c948c0628ac010a528357e69a57cab5b8a68ac6fa422f8b7

  • SSDEEP

    49152:WFUcx88PWPOpX0SFufpDNc6dBA0hE+pBV7I9qwMyGc:W+K88uPCHIcf0m2V7I4yGc

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe
    "C:\Users\Admin\AppData\Local\Temp\25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Users\Admin\AppData\Local\Temp\EFBC.tmp
      "C:\Users\Admin\AppData\Local\Temp\EFBC.tmp" --splashC:\Users\Admin\AppData\Local\Temp\25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.exe 050E9F08E3B2C6F4709479A0D10CF202F6B8E4791D420E055337405776FE764328E2073C988003A589CA63E2F0F669011FE93BF4C1B1E6614AB3968A0182E1B7
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2720
      • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
        "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.docx"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:2792

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\25c9aafbab06d87498d814e0f241a139f0eb02cb476438d12bc82ba8468cd9f3.docx

    Filesize

    19KB

    MD5

    4046ff080673cffac6529512b8d3bdbb

    SHA1

    d3cbc39065b7a55e995fa25397da2140bdac80c1

    SHA256

    f0c1b360c0b24b5450a79138650e6ee254afae6ce8f6c68da7d1f32f91582680

    SHA512

    453f70730b7560e3d3e23ddfa0fe74e014753f8b34b45254c1c0cf5fec0546a2b8b109a4f9d096e91711b6d02cb383a7136c2cb7bd6600d0598acf7c90c25418

  • C:\Users\Admin\AppData\Local\Temp\EFBC.tmp

    Filesize

    2.0MB

    MD5

    bcbc3cf2e1ae4412dbe57ce0de919327

    SHA1

    ae4e42ffbbc9c6fa38e5e203ae109b8fb30485fa

    SHA256

    a1652e88e75880aa5ff30dbb51ef2191a48a82cf4ad1198e5f7dd99d3d7b27d1

    SHA512

    4189dc011852dd5230be1d7afbb9f6221fe0ba1ed67c8704451568309df0aac55897cf1000460015d21fec4a1c58f97298b098d594becdba9e3f102735b4d61b

  • memory/2112-0-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/2720-6-0x0000000000400000-0x0000000000606000-memory.dmp

    Filesize

    2.0MB

  • memory/2792-9-0x000000002FEB1000-0x000000002FEB2000-memory.dmp

    Filesize

    4KB

  • memory/2792-10-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2792-11-0x000000007123D000-0x0000000071248000-memory.dmp

    Filesize

    44KB