Analysis

  • max time kernel
    40s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:36

General

  • Target

    DUMP_00A10000-00A1D000.exe.ViR.exe

  • Size

    52KB

  • MD5

    6152709e741c4d5a5d793d35817b4c3d

  • SHA1

    05ae9c76f8f85ad2247c06d26a88bbbcfff4d62e

  • SHA256

    2c4c8066a1a7dfdf42c57ff4f9016f1ba05bcb004ff8b0ffc0989165d2ad30e2

  • SHA512

    1e5ebd53ac942b0f06f759f936efebeeb9a74062647cd978d5112720f772f607b12ee20c02ab838104a7a947fef2fde79b0db944286d8daf2e6e6d16e10b9390

  • SSDEEP

    768:UR/FcohAQFBY4JzKNkN3QZ0gGINlVOWcm:U1PhAQztJWNeCVOWc

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DUMP_00A10000-00A1D000.exe.ViR.exe
    "C:\Users\Admin\AppData\Local\Temp\DUMP_00A10000-00A1D000.exe.ViR.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2096
    • C:\Users\Admin\AppData\Roaming\DirectX.exe
      "C:\Users\Admin\AppData\Roaming\DirectX.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      PID:1404
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c aaa.bat
      2⤵
      • Deletes itself
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2756
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /f /im DUMP_00A10000-00A1D000.exe.ViR.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2884

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\aaa.bat

    Filesize

    149B

    MD5

    3e59a76bf84cb9d1a8585c17cda9b949

    SHA1

    60fdb9e6bf1154aad3a332ad5657a9d62a5be73a

    SHA256

    21060b57f9392d62259c274427c4bb6caf19b228716d691f44a26958b3620d5f

    SHA512

    01bd3726c30e304dd712d302a9081052b50a85a28c586458b691e748b1867e85fa679e58db304793a18f554b8a8c17af00bd38e795d3fdb6b0f5a873f80b5303

  • C:\Users\Admin\AppData\Roaming\DirectX.exe

    Filesize

    52KB

    MD5

    6152709e741c4d5a5d793d35817b4c3d

    SHA1

    05ae9c76f8f85ad2247c06d26a88bbbcfff4d62e

    SHA256

    2c4c8066a1a7dfdf42c57ff4f9016f1ba05bcb004ff8b0ffc0989165d2ad30e2

    SHA512

    1e5ebd53ac942b0f06f759f936efebeeb9a74062647cd978d5112720f772f607b12ee20c02ab838104a7a947fef2fde79b0db944286d8daf2e6e6d16e10b9390

  • memory/1404-24-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2096-0-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB

  • memory/2096-10-0x0000000003C40000-0x0000000003C59000-memory.dmp

    Filesize

    100KB

  • memory/2096-21-0x0000000000400000-0x0000000000419000-memory.dmp

    Filesize

    100KB