Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2024 09:17

General

  • Target

    b14def9d7279dd3a9008175e0572d5d4ad3885a5f3af73eb546b690cce97359eN.exe

  • Size

    67KB

  • MD5

    694d8bfd652759013976537a57f0b520

  • SHA1

    fccff9ab35453ec423dfca7a8eb6a42faa2cf089

  • SHA256

    b14def9d7279dd3a9008175e0572d5d4ad3885a5f3af73eb546b690cce97359e

  • SHA512

    fb36df6ef6989e18f5bce835a47f97c4c58153c9055e4e1dfc969f7e5b9704856ca47158e2e29c69b6de2ada26f955c52e7f83a9ac4bdd91e869f7db9b711820

  • SSDEEP

    768:r8eRH+MlFh0pDpuJ84WEi+U6sh7iQroCHmyf+RjFBSuB2XpfsPpzSd3xyV:r9l+W8xFt6sh7iQroCoRB0u0sPpzStxO

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b14def9d7279dd3a9008175e0572d5d4ad3885a5f3af73eb546b690cce97359eN.exe
    "C:\Users\Admin\AppData\Local\Temp\b14def9d7279dd3a9008175e0572d5d4ad3885a5f3af73eb546b690cce97359eN.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1992
    • C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe
      "C:\Users\Admin\AppData\Local\Temp\bkgrnd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      PID:1844

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\bkgrnd.exe

    Filesize

    67KB

    MD5

    335a2f40e1ae476dd48e161f269448f0

    SHA1

    391dd84e7a1a086a33c2a0032db47804051d37f5

    SHA256

    ac7f918d67ee5b61a790d5f708821e8f72f411aed9c0eebd25eb98f595861360

    SHA512

    285597779107898b15a01c5d423aa968b63378a67f7efb6c5c1fe5d7df04dab7a8f0bc7ac6a1348e5ec19268c3120307a3285601b8d0f191aacc83a5fa57f318

  • memory/1844-9-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1844-37-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB

  • memory/1992-2-0x0000000004000000-0x0000000004006000-memory.dmp

    Filesize

    24KB

  • memory/1992-1-0x0000000004000000-0x0000000004006000-memory.dmp

    Filesize

    24KB

  • memory/1992-0-0x0000000000400000-0x000000000040F000-memory.dmp

    Filesize

    60KB