Analysis

  • max time kernel
    837s
  • max time network
    843s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 02:36

General

  • Target

    757a661bcc68616f99366b10abac92d8.exe

  • Size

    231KB

  • MD5

    757a661bcc68616f99366b10abac92d8

  • SHA1

    9a7173aa6b51643417ce37f8b1238de4dd45b516

  • SHA256

    f1ba18a6b67c5e1c659b3cbab2b12abb416dd62087cc9870650c0d8c73047739

  • SHA512

    c6d55af7d3fd3740e5b86aadcfaa463b564458f914bb2140bb2f971e632195d2ca84991f1f694c4cfbb1b6d8156b0ce0413e5c8afb874531eb1ad34b37e36843

  • SSDEEP

    6144:4CzaYkhfMMTzhpWuaEU5rXQokUERHxtYXwNg:jtcfMShwuaKoCRHQe

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\757a661bcc68616f99366b10abac92d8.exe
    "C:\Users\Admin\AppData\Local\Temp\757a661bcc68616f99366b10abac92d8.exe"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2748
    • C:\Users\Admin\AppData\Local\Temp\WindowsSoundDriver.exe
      "C:\Users\Admin\AppData\Local\Temp\WindowsSoundDriver.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2208

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\WindowsSoundDriver.exe

    Filesize

    12KB

    MD5

    501236257b9cc98224761f9493e83f55

    SHA1

    58d69aea5516fd8796175e94b1c34485a577500b

    SHA256

    37d8c90db3cbf36d20bdc979bbba313b7f146d17c79b7133fe4681b5b1e1f9f2

    SHA512

    158c19b3dde594f173f78e6f672f3493b4085bea6ee74ae24e5b9a438b1df9b2d295521dd8644b9def44a19d8e107b0c6d2efc492f045c7d33e49d314ba61ecc

  • C:\Users\Admin\Documents\decrpt.openwithnotepad

    Filesize

    15B

    MD5

    1548147eea5a6e1d0f35b39f4325e009

    SHA1

    09c7798e76c346089978a4d589ff84631de83797

    SHA256

    f21d4f3a297cb46304903facd150196081318ac62be7fedfb0950ebd0f6f8b83

    SHA512

    28a2b3781296aa67ac61d8a52d854906c78eb573d5d6ba222a26dc899f7c5b002d6b268be36b93d828c5cc5514f0bfb1357557b50d4645ce8b1119041f9681f9

  • memory/2208-16-0x0000000074660000-0x0000000074D4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2208-32-0x0000000074660000-0x0000000074D4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2208-12-0x0000000000960000-0x000000000096A000-memory.dmp

    Filesize

    40KB

  • memory/2208-11-0x000000007466E000-0x000000007466F000-memory.dmp

    Filesize

    4KB

  • memory/2748-10-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2748-2-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2748-0-0x000007FEF633E000-0x000007FEF633F000-memory.dmp

    Filesize

    4KB

  • memory/2748-3-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2748-33-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2748-1-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2748-35-0x000007FEF633E000-0x000007FEF633F000-memory.dmp

    Filesize

    4KB

  • memory/2748-36-0x000007FEF6080000-0x000007FEF6A1D000-memory.dmp

    Filesize

    9.6MB

  • memory/2748-37-0x0000000000AB0000-0x0000000000B30000-memory.dmp

    Filesize

    512KB

  • memory/2748-38-0x0000000000AB0000-0x0000000000B30000-memory.dmp

    Filesize

    512KB