Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2024, 11:38

General

  • Target

    d862746f084183bb16765decc21f0eea62c48ac96eed0f9364a8a9af3248db6d.exe

  • Size

    232KB

  • MD5

    460a381c320cf3cdb78be1dac853c5f8

  • SHA1

    1fcc3c325983e71dcc7e5805cd2c98c5158ba645

  • SHA256

    d862746f084183bb16765decc21f0eea62c48ac96eed0f9364a8a9af3248db6d

  • SHA512

    61c42397ac0b82c40b721b7b381b3a79aaaec11faab91757111b68768a140670c2f17cde8887324a7aad2895d486d9f154e681ac92902370a9cee80d65b9fbee

  • SSDEEP

    6144:dU3PFKs78g2KyEOaWEqxF6snji81RUinKdNOb6:8Ph+mF7

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d862746f084183bb16765decc21f0eea62c48ac96eed0f9364a8a9af3248db6d.exe
    "C:\Users\Admin\AppData\Local\Temp\d862746f084183bb16765decc21f0eea62c48ac96eed0f9364a8a9af3248db6d.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\lrciy.exe
      "C:\Users\Admin\lrciy.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2524

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\lrciy.exe

    Filesize

    232KB

    MD5

    ccdc8121e85a0e36ff763220dbbc46d2

    SHA1

    d7a7fa14ee4f3e0c3ddb8d83299843e661a75837

    SHA256

    d07bb72eb758da7ca44d0e36ff2dfa9710c588bd3f5e043d1a28f7bfbedd941f

    SHA512

    5ff3001c8d313d153c5b1c1d892cd1828bc83abd87527500110cf4416bc54daddab289759b619d2132ab5a7d9629f94a1036826af9336c292f0362aea1f75f82