Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2024 23:14

General

  • Target

    db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe

  • Size

    255KB

  • MD5

    77eef7dd7e95bc2abb9b7e1ce8c563f0

  • SHA1

    dd22756ba279a54c3fd82009310f5ca4d1198b42

  • SHA256

    db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101

  • SHA512

    cecf4a7707262d2b19e3ebdf69f0a71d363e86f21351c35e489f8b2dccb8e8ae46e20446c38e4f84a088afceaeea9aa434270f46513e1fbbd46db181f9f9c6a4

  • SSDEEP

    6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQSM:EeGUA5YZazpXUmZhdM

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe
    "C:\Users\Admin\AppData\Local\Temp\db2f17eac238eb35848a541d4876b0084d8baaaaaeb0d0ab2a5d2112c610d101N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
      "C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
        "C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"
        3⤵
          PID:2380

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

      Filesize

      255KB

      MD5

      b25b6d1044b19612ffd84fadee9abc62

      SHA1

      5bd46a2f94a2724ee7ea9432a446baa06d486ffb

      SHA256

      4d078c3ce1396bfdec7c708723146f096e34782d822fae5499a7b9fe5be5f91d

      SHA512

      56ec89505f8d6aca4255143225a4087c0e20760cf3780d853acb36b8205f225aaf23d6c08b259e6ff0330c3b384831a75e49d16a1b36433d0718cb5869122c91

    • memory/1628-15-0x0000000074C40000-0x00000000751EB000-memory.dmp

      Filesize

      5.7MB

    • memory/1628-1-0x0000000074C40000-0x00000000751EB000-memory.dmp

      Filesize

      5.7MB

    • memory/1628-3-0x0000000074C40000-0x00000000751EB000-memory.dmp

      Filesize

      5.7MB

    • memory/1628-4-0x0000000074C40000-0x00000000751EB000-memory.dmp

      Filesize

      5.7MB

    • memory/1628-5-0x0000000074C40000-0x00000000751EB000-memory.dmp

      Filesize

      5.7MB

    • memory/1628-6-0x0000000074C40000-0x00000000751EB000-memory.dmp

      Filesize

      5.7MB

    • memory/1628-2-0x0000000074C40000-0x00000000751EB000-memory.dmp

      Filesize

      5.7MB

    • memory/1628-0-0x0000000074C41000-0x0000000074C42000-memory.dmp

      Filesize

      4KB

    • memory/2152-16-0x0000000074C40000-0x00000000751EB000-memory.dmp

      Filesize

      5.7MB

    • memory/2152-18-0x0000000074C40000-0x00000000751EB000-memory.dmp

      Filesize

      5.7MB

    • memory/2152-19-0x0000000074C40000-0x00000000751EB000-memory.dmp

      Filesize

      5.7MB

    • memory/2152-17-0x0000000074C40000-0x00000000751EB000-memory.dmp

      Filesize

      5.7MB

    • memory/2152-20-0x0000000074C40000-0x00000000751EB000-memory.dmp

      Filesize

      5.7MB

    • memory/2152-21-0x0000000074C40000-0x00000000751EB000-memory.dmp

      Filesize

      5.7MB

    • memory/2152-23-0x0000000074C40000-0x00000000751EB000-memory.dmp

      Filesize

      5.7MB