Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:23

General

  • Target

    Drawing.exe

  • Size

    659KB

  • MD5

    dbccfac98a87f688ab798921d7cb9524

  • SHA1

    43a73100212a251590045f14c74b14544362ecb6

  • SHA256

    d1b0a3c99d853a482c44e0d10cc3507983e1c4e0c862a5c72f24d2044280c1e0

  • SHA512

    a0652b07d445e918c07e40383044fb2ca61a75f4c7aca965b36beffe0987fa371cdffe6a2ffb841b8a86073c5edc68c96ab18a394bb0a8b3e89fa79b30ae61ff

  • SSDEEP

    6144:2NeZhGRARDdq3EtPMBMqSsU30PI3FG7gXGhl5Ti2ztyUGTSPiTrufZ5wES06cgG2:2N4uoNtTVPXiDiyn4BufL9PNgdOut

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Drawing.exe
    "C:\Users\Admin\AppData\Local\Temp\Drawing.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2556
    • C:\Users\Admin\AppData\Local\Temp\kwwsdijia.exe
      C:\Users\Admin\AppData\Local\Temp\kwwsdijia.exe C:\Users\Admin\AppData\Local\Temp\rnxvcwia
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Users\Admin\AppData\Local\Temp\kwwsdijia.exe
        C:\Users\Admin\AppData\Local\Temp\kwwsdijia.exe C:\Users\Admin\AppData\Local\Temp\rnxvcwia
        3⤵
          PID:2332

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\a4vlxs9uvejnijj

      Filesize

      211KB

      MD5

      a18234592746844a5f6b6194dec2f5ab

      SHA1

      c3d72898f3de2a02950b39aa6dd8cea20e8a5b56

      SHA256

      435bb5fb4de9e7773cd4a1220a493031b7d40b432093cf85d65e04d96162043d

      SHA512

      37817ce424fdfd9cad4986af43eee6224796cbd8bc85f740c8d3a625e96496255747b9e3b02d66d47094e42dd0cb339d292817ff091a746216e63c7c0e5eb35c

    • C:\Users\Admin\AppData\Local\Temp\rnxvcwia

      Filesize

      5KB

      MD5

      1630f2f2128004a1065bf6da2e1d3e0a

      SHA1

      e6e0aa51141b8ab82a48756f4b5df15701f7d3ce

      SHA256

      adb35069bfa1334e933f454e3f14dcb4cf0edca79f31ab12b77ea25fcdc9a756

      SHA512

      0997b532307a47ec29eee8b309329c1bb8658b3ed54027c52981b763fcaba30cbb81efe61d1cb8c28cbae6108a5ed3d50d80c2add3ea214764f1d330065b4085

    • \Users\Admin\AppData\Local\Temp\kwwsdijia.exe

      Filesize

      4KB

      MD5

      0b70cb345538f08f82d8f9fc2aad7830

      SHA1

      44a374fe05691165214657f1269d9d01d84fcf6e

      SHA256

      93eff5a1cdcd83a8ad32e4f3122f31baf07fae3502d1765edf467b76fce07288

      SHA512

      27c20b4e4fbc5923a1e8e4a079de46d42d37e7d266d72181bde79db07f177005ebd1caae2de651b077a92f1a5a387d5e60b6663ae7f0550d2dad332e566cfdbc

    • memory/2084-9-0x0000000000160000-0x0000000000162000-memory.dmp

      Filesize

      8KB