Resubmissions

21-11-2024 20:20

241121-y4nlrs1nar 10

Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:20

General

  • Target

    1c1510d9d6c4c46067dbb55056a720bc9e69ac47a4e66c6765886a25d4f6d4cc.exe

  • Size

    5.8MB

  • MD5

    6192ed4726e46be98934d1e4ebebb7e3

  • SHA1

    df8badbe186b9ca3cd88bc4014a3a4aac8ac1736

  • SHA256

    1c1510d9d6c4c46067dbb55056a720bc9e69ac47a4e66c6765886a25d4f6d4cc

  • SHA512

    b7a8f9cc0d3f214272e3b51bc02f14db11d5c2c1bb0177c31a8dca7fd1f1fa1e08aa6ec6c9b9de652455fc5fbe3abb939d0c591cece2e075adbe963fb6ca0969

  • SSDEEP

    98304:0wREfWuXTo8ToIebV6oHFE9xI6ohWhPSwVrGiGfm8EOuq2NmF:MfWW8uGY9xVoY9zELHPuqimF

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Windows directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1c1510d9d6c4c46067dbb55056a720bc9e69ac47a4e66c6765886a25d4f6d4cc.exe
    "C:\Users\Admin\AppData\Local\Temp\1c1510d9d6c4c46067dbb55056a720bc9e69ac47a4e66c6765886a25d4f6d4cc.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Users\Admin\AppData\Local\Temp\is-ITOAP.tmp\1c1510d9d6c4c46067dbb55056a720bc9e69ac47a4e66c6765886a25d4f6d4cc.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-ITOAP.tmp\1c1510d9d6c4c46067dbb55056a720bc9e69ac47a4e66c6765886a25d4f6d4cc.tmp" /SL5="$40150,5022309,876544,C:\Users\Admin\AppData\Local\Temp\1c1510d9d6c4c46067dbb55056a720bc9e69ac47a4e66c6765886a25d4f6d4cc.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2696
      • C:\Users\Admin\AppData\Local\Temp\1c1510d9d6c4c46067dbb55056a720bc9e69ac47a4e66c6765886a25d4f6d4cc.exe
        "C:\Users\Admin\AppData\Local\Temp\1c1510d9d6c4c46067dbb55056a720bc9e69ac47a4e66c6765886a25d4f6d4cc.exe" /VERYSILENT
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2748
        • C:\Users\Admin\AppData\Local\Temp\is-UHCE9.tmp\1c1510d9d6c4c46067dbb55056a720bc9e69ac47a4e66c6765886a25d4f6d4cc.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-UHCE9.tmp\1c1510d9d6c4c46067dbb55056a720bc9e69ac47a4e66c6765886a25d4f6d4cc.tmp" /SL5="$50150,5022309,876544,C:\Users\Admin\AppData\Local\Temp\1c1510d9d6c4c46067dbb55056a720bc9e69ac47a4e66c6765886a25d4f6d4cc.exe" /VERYSILENT
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          PID:2732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\is-ITOAP.tmp\1c1510d9d6c4c46067dbb55056a720bc9e69ac47a4e66c6765886a25d4f6d4cc.tmp

    Filesize

    3.2MB

    MD5

    3d1cca2f13bb47bf0831cbc51aed9dcf

    SHA1

    8778a5e8406a10d97e4fb5f56aae3daca8ce147f

    SHA256

    a3fe3785d7c05c9aae3fcfef09b01dc4a4746d3724436fd506b7b84b2a5b60ef

    SHA512

    bb8ad21c3cbe427b43caec1a9c13c0dbba4d81654a81f94a8c8484a6b77bea135904b8e702cddba48ed64330df4383873b80aea8b318c8bc1b1ff124e0c9c13c

  • memory/2016-2-0x0000000001241000-0x00000000012E9000-memory.dmp

    Filesize

    672KB

  • memory/2016-0-0x0000000001240000-0x0000000001324000-memory.dmp

    Filesize

    912KB

  • memory/2016-15-0x0000000001240000-0x0000000001324000-memory.dmp

    Filesize

    912KB

  • memory/2696-8-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB

  • memory/2696-13-0x0000000000290000-0x00000000005D3000-memory.dmp

    Filesize

    3.3MB

  • memory/2732-31-0x00000000012A0000-0x00000000015E3000-memory.dmp

    Filesize

    3.3MB

  • memory/2748-11-0x0000000001240000-0x0000000001324000-memory.dmp

    Filesize

    912KB

  • memory/2748-32-0x0000000001240000-0x0000000001324000-memory.dmp

    Filesize

    912KB