Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 18:17

General

  • Target

    a034366648b01d614c154f3cbf371916be93bcd3f7a02a2b36209af355beaf79.exe

  • Size

    2.6MB

  • MD5

    08d5869bc24d424f76b8b862fb4d3ece

  • SHA1

    542bf39e63aba74891f9b25e3a602cd8e364d1ea

  • SHA256

    a034366648b01d614c154f3cbf371916be93bcd3f7a02a2b36209af355beaf79

  • SHA512

    afcc32c0af3d9bda5eddc4f69911a1aa2b6029a0b071ef81f22e109bdde68ab2638349f97d7f2d605f720c23c9964de95ea1a63beb85f4182c11a68576774aa0

  • SSDEEP

    49152:cR0ZLQZ86dP3eKzjkGxE2KQKsVbr1ZjePG72Gq:rU1I2KQ95d72Gq

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a034366648b01d614c154f3cbf371916be93bcd3f7a02a2b36209af355beaf79.exe
    "C:\Users\Admin\AppData\Local\Temp\a034366648b01d614c154f3cbf371916be93bcd3f7a02a2b36209af355beaf79.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\Jxcctcijbz.exe
      "C:\Users\Admin\AppData\Local\Temp\Jxcctcijbz.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3232
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3232 -s 700
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:4568
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3012 -s 964
      2⤵
      • Program crash
      PID:4472

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\Jxcctcijbz.exe

    Filesize

    1.6MB

    MD5

    3d51aa3be60a3b06f585355321a41820

    SHA1

    bf2a286e0f4106ff2532e2fb58b41a1799bb850e

    SHA256

    d35840cf3d68a66fc130f659e4cae73f16d3559c55326c901cb78c1a399edfd0

    SHA512

    3037869efb0040e69feaad1131b6499d8ef0f2cc9ea0dd9655e2e757cdff172c3729f9a3788d327000aff50521c779ba8f0dc9cf96b3e9d7988f38196b5b3388

  • memory/3012-0-0x0000000074A1E000-0x0000000074A1F000-memory.dmp

    Filesize

    4KB

  • memory/3012-1-0x0000000000DB0000-0x000000000104A000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-2-0x0000000074A10000-0x00000000750FE000-memory.dmp

    Filesize

    6.9MB

  • memory/3012-3-0x0000000005230000-0x00000000054C8000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-4-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-13-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-33-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-43-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-41-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-39-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-37-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-35-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-31-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-29-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-27-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-25-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-23-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-21-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-19-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-17-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-15-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-11-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-9-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-7-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-5-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-45-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-47-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-49-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-51-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-53-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-55-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-57-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-65-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-63-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-61-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-59-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-67-0x0000000005230000-0x00000000054C2000-memory.dmp

    Filesize

    2.6MB

  • memory/3012-1078-0x0000000074A10000-0x00000000750FE000-memory.dmp

    Filesize

    6.9MB

  • memory/3012-1079-0x0000000006E40000-0x000000000704A000-memory.dmp

    Filesize

    2.0MB

  • memory/3012-1080-0x00000000048F0000-0x000000000493C000-memory.dmp

    Filesize

    304KB

  • memory/3012-1081-0x0000000074A1E000-0x0000000074A1F000-memory.dmp

    Filesize

    4KB

  • memory/3012-1082-0x0000000074A10000-0x00000000750FE000-memory.dmp

    Filesize

    6.9MB

  • memory/3012-1083-0x0000000074A10000-0x00000000750FE000-memory.dmp

    Filesize

    6.9MB

  • memory/3012-1093-0x0000000004E90000-0x0000000004EE4000-memory.dmp

    Filesize

    336KB

  • memory/3012-2173-0x0000000074A10000-0x00000000750FE000-memory.dmp

    Filesize

    6.9MB

  • memory/3232-1092-0x0000000074A10000-0x00000000750FE000-memory.dmp

    Filesize

    6.9MB

  • memory/3232-1091-0x0000000001190000-0x000000000132E000-memory.dmp

    Filesize

    1.6MB

  • memory/3232-1094-0x0000000074A10000-0x00000000750FE000-memory.dmp

    Filesize

    6.9MB

  • memory/3232-1095-0x0000000004FE0000-0x000000000517C000-memory.dmp

    Filesize

    1.6MB

  • memory/3232-2171-0x0000000004D90000-0x0000000004E9E000-memory.dmp

    Filesize

    1.1MB

  • memory/3232-2170-0x0000000074A10000-0x00000000750FE000-memory.dmp

    Filesize

    6.9MB

  • memory/3232-2174-0x0000000074A10000-0x00000000750FE000-memory.dmp

    Filesize

    6.9MB

  • memory/3232-2176-0x0000000074A10000-0x00000000750FE000-memory.dmp

    Filesize

    6.9MB

  • memory/3232-2183-0x0000000074A10000-0x00000000750FE000-memory.dmp

    Filesize

    6.9MB