Resubmissions

27-11-2024 13:27

241127-qqdkmsvnhz 10

27-11-2024 09:28

241127-lfrx3atrgr 10

Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    27-11-2024 09:28

General

  • Target

    cfc68c40f4631954894898633fd0c5a06c5ce5837eba7d4b56fc3514c01e124f.exe

  • Size

    595KB

  • MD5

    dedb7d290dc95b76d6daf34569d25522

  • SHA1

    7bc1c4e3ca288a096ef9abb347238e904970a955

  • SHA256

    cfc68c40f4631954894898633fd0c5a06c5ce5837eba7d4b56fc3514c01e124f

  • SHA512

    bfae90fa15abd4513869f55a8b51501da68222b3475fdb77292130fa6da32c025983d5715e12572a8083f1f758336032483ec7cb9a388875e106105d7c6e2ac2

  • SSDEEP

    12288:egYqC/dIVYS1QYMHy4Ijd1jF4sjMUUWp+GIMHg:hodIVyYMS4IjTljcO+hM

Score
6/10

Malware Config

Signatures

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cfc68c40f4631954894898633fd0c5a06c5ce5837eba7d4b56fc3514c01e124f.exe
    "C:\Users\Admin\AppData\Local\Temp\cfc68c40f4631954894898633fd0c5a06c5ce5837eba7d4b56fc3514c01e124f.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:308
    • C:\Users\Admin\AppData\Local\Temp\cfc68c40f4631954894898633fd0c5a06c5ce5837eba7d4b56fc3514c01e124f.exe
      C:\Users\Admin\AppData\Local\Temp\cfc68c40f4631954894898633fd0c5a06c5ce5837eba7d4b56fc3514c01e124f.exe
      2⤵
        PID:2892
      • C:\Users\Admin\AppData\Local\Temp\cfc68c40f4631954894898633fd0c5a06c5ce5837eba7d4b56fc3514c01e124f.exe
        C:\Users\Admin\AppData\Local\Temp\cfc68c40f4631954894898633fd0c5a06c5ce5837eba7d4b56fc3514c01e124f.exe
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2880

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/308-40-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-1647-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/308-2-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/308-3-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/308-4-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

      Filesize

      4KB

    • memory/308-5-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/308-6-0x0000000000680000-0x00000000006C2000-memory.dmp

      Filesize

      264KB

    • memory/308-7-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/308-8-0x0000000004980000-0x00000000049E0000-memory.dmp

      Filesize

      384KB

    • memory/308-30-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-42-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-72-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-70-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-66-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-46-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-62-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-58-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-56-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-54-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-52-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-50-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-48-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-64-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-1-0x0000000000C80000-0x0000000000D1A000-memory.dmp

      Filesize

      616KB

    • memory/308-26-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-38-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-36-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-34-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-32-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-68-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-60-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-28-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-0-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

      Filesize

      4KB

    • memory/308-24-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-22-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-20-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-18-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-16-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-14-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-12-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-10-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-9-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-44-0x0000000004980000-0x00000000049D9000-memory.dmp

      Filesize

      356KB

    • memory/308-1660-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/2880-1661-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/2880-1662-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/2880-1659-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/2880-1663-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB