Analysis

  • max time kernel
    117s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2024, 19:58

General

  • Target

    6c71ee7f6920531d7d5a29dab191f7196a135ffd558106193c18e1155c851abe.exe

  • Size

    76KB

  • MD5

    3c052f2a11337af28ec200097917d377

  • SHA1

    6dbe8a3e9866bf60167c9319ead4033b96e30789

  • SHA256

    6c71ee7f6920531d7d5a29dab191f7196a135ffd558106193c18e1155c851abe

  • SHA512

    497bad33ff9ecc69eeaece52184ac3a5bd1a1366b06c42daf8134c21873eba75d26b87e65f4cac3a72d4257703f29e5d43a0517bd4534fc393dde35f9db796eb

  • SSDEEP

    768:zZVy+DZ4mV+RMO2rhgFwuqCbxTGy/BBGg4NKhLU4dhbDW2+Kv00dX0vN0TlT+Xyo:Jamlu3hbBGy3G8nhMpj

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies system executable filetype association 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 6 IoCs
  • Drops file in Program Files directory 34 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 36 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c71ee7f6920531d7d5a29dab191f7196a135ffd558106193c18e1155c851abe.exe
    "C:\Users\Admin\AppData\Local\Temp\6c71ee7f6920531d7d5a29dab191f7196a135ffd558106193c18e1155c851abe.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Loads dropped DLL
    • Modifies system executable filetype association
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2708
    • \??\c:\Documents and Settings\Admin\Application Data\Microsoft\asct.exe
      "c:\Documents and Settings\Admin\Application Data\Microsoft\asct.exe" 6c71ee7f6920531d7d5a29dab191f7196a135ffd558106193c18e1155c851abe
      2⤵
      • Modifies visibility of file extensions in Explorer
      • Executes dropped EXE
      • Modifies system executable filetype association
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious use of SetWindowsHookEx
      PID:2788

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\asct.exe

    Filesize

    76KB

    MD5

    8d8351c6145804643b7d546708d9f1f2

    SHA1

    9b2dfa0a095effaff1f8a326b5529c410369c6ec

    SHA256

    8d2040e637878bdef68f5caa99e3a8b843de40e8349d538d011f6c94006a017c

    SHA512

    ccd375d604d6d4ec3bdb9ad1822515cda5138607b9b30c1d0aa32d6d7cc890614f4c5d995bf982213b9a2fd7e94f33535203e67c03e6e6a3b78acdb2b4c85e90

  • \??\c:\windows\SysWOW64\maxtrox.txt

    Filesize

    8B

    MD5

    24865ca220aa1936cbac0a57685217c5

    SHA1

    37f687cafe79e91eae6cbdffbf2f7ad3975f5e83

    SHA256

    841e95fa333ed89085bfbab19bb658d96ed0c837d25721411233fa55c860c743

    SHA512

    c8d3f514c72f48fed5de9582c4252cf5466a9d32866d8df3631ba9274ed734bb95139e4909e8116a10947fc1afa1dbeb33809da6ec050e6e4eb83d5241aeb062