Analysis

  • max time kernel
    95s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 03:43

General

  • Target

    file (6).exe

  • Size

    157KB

  • MD5

    438580ccbffdc97ad5b9f09a213c3e8f

  • SHA1

    0437c2003974a979ecc4170544f2f863c7dafd12

  • SHA256

    f77ef2ace574ee9a7d758ef00f7df14c940381625b12a4b65e5e292d1ef34b1c

  • SHA512

    a8214216662cc7323b3ab0aec016647581ff2ca68edeab9bf340c7befb088f501d7d592f901eea48211681bcf5f90fc74293b940152f32e1be6555f55dd4dbd8

  • SSDEEP

    3072:0t6Gtx/jjOtP8JV4Y1aaH67pnMK/MdyGwsNYFfP:0thut0JV3fOMdE

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Subvert Trust Controls: Mark-of-the-Web Bypass 1 TTPs 1 IoCs

    When files are downloaded from the Internet, they are tagged with a hidden NTFS Alternate Data Stream (ADS) named Zone.Identifier with a specific value known as the MOTW.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NTFS ADS 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file (6).exe
    "C:\Users\Admin\AppData\Local\Temp\file (6).exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\ProgramData\Media\rdb.bat
      2⤵
      • Subvert Trust Controls: Mark-of-the-Web Bypass
      • System Location Discovery: System Language Discovery
      • NTFS ADS
      PID:2652
    • C:\ProgramData\Media\module.exe
      -wait
      2⤵
      • UAC bypass
      • Executes dropped EXE
      • Checks whether UAC is enabled
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • System policy modification
      PID:2764
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 328
      2⤵
      • Program crash
      PID:2696

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Media\module.exe:Zone.Identifier

    Filesize

    13B

    MD5

    38de427224a5082a04fe82e2bd4ea9ec

    SHA1

    7e4a53de1f83762dd2febd39b818e2258bc83bc1

    SHA256

    12f99f53144294750fe8713d580eda286f4bd95cd9c840db8ab957def8040028

    SHA512

    ec3f3c324eeaad91ab0efd47b3084493d863f969344fa1ba87ace1974908053d396673b44c33b4dceeef792a74ad9278e06acc27c83459af1153de52f83afcbf

  • C:\ProgramData\Media\rdb.bat

    Filesize

    77B

    MD5

    d10f631a08d4953930bdd79bc3ddd009

    SHA1

    8309a6decb6f6c8f8a2e2eea80fde3464e6aaf00

    SHA256

    047d32c8b8314c8b1fa11504d53ac22fa6c7f2b2e0088c0c7523e28214a78c4e

    SHA512

    99bd26c3450b197eb84f2ca8ad31d5b26bd9469aba83f795a01237833115522d5c96136e54ec0038ab4120e30269a13fca9f4e042ee695a34eb17d19489bf7ae

  • \ProgramData\Media\module.exe

    Filesize

    157KB

    MD5

    438580ccbffdc97ad5b9f09a213c3e8f

    SHA1

    0437c2003974a979ecc4170544f2f863c7dafd12

    SHA256

    f77ef2ace574ee9a7d758ef00f7df14c940381625b12a4b65e5e292d1ef34b1c

    SHA512

    a8214216662cc7323b3ab0aec016647581ff2ca68edeab9bf340c7befb088f501d7d592f901eea48211681bcf5f90fc74293b940152f32e1be6555f55dd4dbd8

  • memory/2216-1-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2216-0-0x0000000000418000-0x0000000000424000-memory.dmp

    Filesize

    48KB

  • memory/2216-2-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2216-3-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2216-20-0x0000000000418000-0x0000000000424000-memory.dmp

    Filesize

    48KB

  • memory/2216-21-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2764-18-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2764-19-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2764-23-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2764-29-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB

  • memory/2764-35-0x0000000000400000-0x0000000000431000-memory.dmp

    Filesize

    196KB