Analysis

  • max time kernel
    65s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:31

General

  • Target

    file (6).exe

  • Size

    157KB

  • MD5

    438580ccbffdc97ad5b9f09a213c3e8f

  • SHA1

    0437c2003974a979ecc4170544f2f863c7dafd12

  • SHA256

    f77ef2ace574ee9a7d758ef00f7df14c940381625b12a4b65e5e292d1ef34b1c

  • SHA512

    a8214216662cc7323b3ab0aec016647581ff2ca68edeab9bf340c7befb088f501d7d592f901eea48211681bcf5f90fc74293b940152f32e1be6555f55dd4dbd8

  • SSDEEP

    3072:0t6Gtx/jjOtP8JV4Y1aaH67pnMK/MdyGwsNYFfP:0thut0JV3fOMdE

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 19 IoCs
  • Suspicious use of SendNotifyMessage 19 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • System policy modification 1 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file (6).exe
    "C:\Users\Admin\AppData\Local\Temp\file (6).exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2196
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\ProgramData\Media\rdb.bat
      2⤵
      • Subvert Trust Controls: Mark-of-the-Web Bypass
      • System Location Discovery: System Language Discovery
      • NTFS ADS
      PID:2700
    • C:\ProgramData\Media\module.exe
      -wait
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2772
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 328
      2⤵
      • Program crash
      PID:2944
  • C:\Windows\system32\taskmgr.exe
    "C:\Windows\system32\taskmgr.exe" /4
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:2888
  • C:\ProgramData\Media\module.exe
    "C:\ProgramData\Media\module.exe"
    1⤵
    • UAC bypass
    • Executes dropped EXE
    • Checks whether UAC is enabled
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2204
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /f /IM taskmgr.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Media\module.exe:Zone.Identifier

    MD5

    d41d8cd98f00b204e9800998ecf8427e

    SHA1

    da39a3ee5e6b4b0d3255bfef95601890afd80709

    SHA256

    e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

    SHA512

    cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

  • C:\ProgramData\Media\rdb.bat

    Filesize

    77B

    MD5

    d10f631a08d4953930bdd79bc3ddd009

    SHA1

    8309a6decb6f6c8f8a2e2eea80fde3464e6aaf00

    SHA256

    047d32c8b8314c8b1fa11504d53ac22fa6c7f2b2e0088c0c7523e28214a78c4e

    SHA512

    99bd26c3450b197eb84f2ca8ad31d5b26bd9469aba83f795a01237833115522d5c96136e54ec0038ab4120e30269a13fca9f4e042ee695a34eb17d19489bf7ae

  • \ProgramData\Media\module.exe

    Filesize

    157KB

    MD5

    438580ccbffdc97ad5b9f09a213c3e8f

    SHA1

    0437c2003974a979ecc4170544f2f863c7dafd12

    SHA256

    f77ef2ace574ee9a7d758ef00f7df14c940381625b12a4b65e5e292d1ef34b1c

    SHA512

    a8214216662cc7323b3ab0aec016647581ff2ca68edeab9bf340c7befb088f501d7d592f901eea48211681bcf5f90fc74293b940152f32e1be6555f55dd4dbd8

  • memory/2196-2-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2196-0-0x0000000000418000-0x0000000000424000-memory.dmp

    Filesize

    48KB

  • memory/2196-3-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2196-20-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2196-21-0x0000000000418000-0x0000000000424000-memory.dmp

    Filesize

    48KB

  • memory/2196-1-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2204-29-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2204-75-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2204-63-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2204-53-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2204-39-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2204-37-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2772-38-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2772-36-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2772-48-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2772-22-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2772-60-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2772-19-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2772-72-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2772-18-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2888-25-0x0000000002ED0000-0x0000000002EE0000-memory.dmp

    Filesize

    64KB

  • memory/2888-24-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB

  • memory/2888-23-0x0000000140000000-0x00000001405E8000-memory.dmp

    Filesize

    5.9MB