Analysis

  • max time kernel
    120s
  • max time network
    115s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 05:04

General

  • Target

    12071c161bcef3d371fb232edaaa0f88f5cf89bb07e6bd466e2bc903bd52bf1aN.exe

  • Size

    296KB

  • MD5

    01eef24d9bdcd750d756c5e8a08b2900

  • SHA1

    3bd5d15aa29289327e2dbfb7de902373094de9d2

  • SHA256

    12071c161bcef3d371fb232edaaa0f88f5cf89bb07e6bd466e2bc903bd52bf1a

  • SHA512

    fcbc4a8d87b622fb8e8b0981e7d44023ca98e2514b99a6e7275e62d140e0e4855928f06eb92bb76274bfb132c160180d85b7b9ac204737d6ce904b8cabc0016d

  • SSDEEP

    6144:72iFRsJcCf2lfKgO32mO1IdifegrSQOJMmSnxtAPUWJj9/P/oEAlu9UY6LxP:7hUTfqmjZHJFnPnp6l2U1P

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 27 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\12071c161bcef3d371fb232edaaa0f88f5cf89bb07e6bd466e2bc903bd52bf1aN.exe
    "C:\Users\Admin\AppData\Local\Temp\12071c161bcef3d371fb232edaaa0f88f5cf89bb07e6bd466e2bc903bd52bf1aN.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Users\Admin\fqhaut.exe
      "C:\Users\Admin\fqhaut.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:2092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\fqhaut.exe

    Filesize

    296KB

    MD5

    b7cc78401e4cf51f1d206203ef661b3b

    SHA1

    7f9e90ad5a3623603432f8e0c4dfd4e7b7b05db5

    SHA256

    9d1ee8198095a28ab938bfae7574903b0d84785ca613b197cd7a86fe469faf88

    SHA512

    7ab0b67bdf494b4454ab7914bd8c6e645bc9249090238ac8388a4895d1f2b80add281c92bbb28992b1c1c1cff56daa02f5ea4b275b34e6f58d0272ca43b60d3a