Analysis

  • max time kernel
    120s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2024 14:29

General

  • Target

    f29362b80f3718cb8ed2f91da9abe1485f72cf92b0da328e99ccfa3f4a613753N.exe

  • Size

    78KB

  • MD5

    e55af3ec5a0c6ef23e025e6fbc913c60

  • SHA1

    a2cce3af7848c2f8b6934f5f438a82246476628b

  • SHA256

    f29362b80f3718cb8ed2f91da9abe1485f72cf92b0da328e99ccfa3f4a613753

  • SHA512

    58f15db702173f77775d9499256994d5fbfa5d0fc1dc7c0285bbfe39b014b70c0a3346e02c9739f3dd09432791e7e31576e973d89662e439d955580d660b016e

  • SSDEEP

    1536:ze5YXT0XRhyRjVf3hTzdEzcEGvCZ1Hc5RPuoYciQty6+9/D+1dz:ze5gSyRxvhTzXPvCbW2Um9/2

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f29362b80f3718cb8ed2f91da9abe1485f72cf92b0da328e99ccfa3f4a613753N.exe
    "C:\Users\Admin\AppData\Local\Temp\f29362b80f3718cb8ed2f91da9abe1485f72cf92b0da328e99ccfa3f4a613753N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\tlowg-j-.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:400
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESD2BB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcD2BA.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2612
    • C:\Users\Admin\AppData\Local\Temp\tmpD172.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpD172.tmp.exe" C:\Users\Admin\AppData\Local\Temp\f29362b80f3718cb8ed2f91da9abe1485f72cf92b0da328e99ccfa3f4a613753N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2248

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESD2BB.tmp

    Filesize

    1KB

    MD5

    53a993ac41d5d34f7721025f93536a28

    SHA1

    3c0609454ab4e9f8ada41defb538b4bea0f6624b

    SHA256

    ee953b75f61de9b92fd079ca8229bb2f1871c8315066a882ca60ba6138aa6707

    SHA512

    34b1bb1bf4614e1b2d8799286858d28c098980e0eae07afe14e3303dae433e0f22f4ae352b8aa456722d093e216f86965757cec756dc8eac3d5849f9da66f766

  • C:\Users\Admin\AppData\Local\Temp\tlowg-j-.0.vb

    Filesize

    14KB

    MD5

    52c26afa7d41c489285c32a6105284f9

    SHA1

    e5c0424cb2600ccb0b359af14ba605ebc6437a07

    SHA256

    622cfbdfa70d2991a3814d4a3e0535f3b7f8aba7bf4d65adfc75048f69b71544

    SHA512

    c907aa6db929f90c61f9e333d72e31ead987d85d2724a6fc0bc0314fcec8de121925c77e0630c6d32b957abd9f94bf943569af7b6a2b6f4d8abba0ad0b02dafe

  • C:\Users\Admin\AppData\Local\Temp\tlowg-j-.cmdline

    Filesize

    266B

    MD5

    1b5496086353735e1616426fdfcb1835

    SHA1

    b011e5e101565e4626c411a793df67c9b640b690

    SHA256

    b75de759581de2531733242371e303a44a333bbf2d1d87874f1def89afa23b16

    SHA512

    840acbf5fdd259725aefeef9d8f3380199de276f0059f31827bd1e3ca13b64eb5815de2579452856a92240209f93ebfd4b7885340b397c42103384d6a7c61534

  • C:\Users\Admin\AppData\Local\Temp\tmpD172.tmp.exe

    Filesize

    78KB

    MD5

    228f350db3a0cd6e6f3b4c24a6717b34

    SHA1

    c5b6d8d2c965f01768233e2135881940988dd426

    SHA256

    b9b82567b777a63006db273e71c37d5db0a8e578cbdb76b70af364be471d3b30

    SHA512

    fefb915403179bc1794b4f4fa369d02d87ea5714d455780365dfeaddf94f4fb3156c58e172e1ecfb1cdecfc3a10939972274597a9b3913aaa6206b4ba98162e5

  • C:\Users\Admin\AppData\Local\Temp\vbcD2BA.tmp

    Filesize

    660B

    MD5

    c17e128fe8f130d4bffc749cf85c8ddf

    SHA1

    26bcc41b8857f017491dae21c7346d28021b6f32

    SHA256

    6d5e9b199ad7c6578653e1444b5e5de6ba49b478d67001999c0845fe82937f08

    SHA512

    267d2af1073ef8b1501c74c3be7d25eb1f0c7c33817b7f961e7c28478329a27a759e177b26b0bbe91c8227e3e12ed45eb90cbd6a7cb97b8ff86465a4f2cc8ee3

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8fd8e054ba10661e530e54511658ac20

    SHA1

    72911622012ddf68f95c1e1424894ecb4442e6fd

    SHA256

    822d92b6f2bd74ba785aa1555b5963c9d7736be1a41241927343dff1caf538d7

    SHA512

    c14d729a30b055df18cfac5258c30574ca93bd05fb9a86b4be47ed041c7a4ceefa636bf1c2dd0ccd4c922eda785ce80127374fb70f965c1cf7cd323da5c1b24c

  • memory/400-8-0x0000000074C40000-0x00000000751EB000-memory.dmp

    Filesize

    5.7MB

  • memory/400-18-0x0000000074C40000-0x00000000751EB000-memory.dmp

    Filesize

    5.7MB

  • memory/1268-0-0x0000000074C41000-0x0000000074C42000-memory.dmp

    Filesize

    4KB

  • memory/1268-1-0x0000000074C40000-0x00000000751EB000-memory.dmp

    Filesize

    5.7MB

  • memory/1268-2-0x0000000074C40000-0x00000000751EB000-memory.dmp

    Filesize

    5.7MB

  • memory/1268-24-0x0000000074C40000-0x00000000751EB000-memory.dmp

    Filesize

    5.7MB