Analysis

  • max time kernel
    141s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 10:13

General

  • Target

    ee18775e61321ded4fd87b6de47cea2ea417156fbf05adc7a6af90b504e0d1d0.exe

  • Size

    3.4MB

  • MD5

    f4451d3793694ca0f1d4c7a9163bd5ac

  • SHA1

    f10851c9903c836c5c66445741ac1fe5f576a433

  • SHA256

    ee18775e61321ded4fd87b6de47cea2ea417156fbf05adc7a6af90b504e0d1d0

  • SHA512

    d6b99dc40fa379201ae704330c14e8323dc7da510a073589079711bfb12ef4b6b77add11bd20685676883fe5ff509a6c33048f6b9e3d73d51174cb05c861b3aa

  • SSDEEP

    98304:jfwYwA0ECxTdjmguMoabIujhjJ9Qwb79:L4PmGTj/9

Score
6/10

Malware Config

Signatures

  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 34 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee18775e61321ded4fd87b6de47cea2ea417156fbf05adc7a6af90b504e0d1d0.exe
    "C:\Users\Admin\AppData\Local\Temp\ee18775e61321ded4fd87b6de47cea2ea417156fbf05adc7a6af90b504e0d1d0.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2532
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\System32\msiexec.exe" /i "C:\Users\Admin\AppData\Local\Temp\4F1E2F6D\msxml.msi"
      2⤵
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:332
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2124

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\4F1E2F6D\msxml.msi

    Filesize

    2.3MB

    MD5

    14e34a6cbd8f060a9c965e39b745657a

    SHA1

    aa70c5c1a7a069af824947bcda1d9893a895318b

    SHA256

    47c2ae679c37815da9267c81fc3777de900ad2551c11c19c2840938b346d70bb

    SHA512

    1fad41de3f61737072cd105f79fd2b48552c6e6db10d2c54e5dc875e046d80bd4de6268eaa8cb7f2de27a19d683c0a05e4cfb7baeaa159df291b1f63f0a96cb2

  • memory/2532-16-0x0000000000400000-0x000000000076C000-memory.dmp

    Filesize

    3.4MB