Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05-12-2024 00:33

General

  • Target

    9910eb24b4278bfccc225b9d0ddb314691f49e7681139a6db5fd2e318663087d.exe

  • Size

    78KB

  • MD5

    242bafc3d644b8d282e4ecd52a4ad909

  • SHA1

    e7d9dd962e18d01cab53e1ce3d1a1ffb1da209a9

  • SHA256

    9910eb24b4278bfccc225b9d0ddb314691f49e7681139a6db5fd2e318663087d

  • SHA512

    b467a877c1b69647e512b1633995deddea5ab70abe3e706c1cca1f9c7f35ddab47e79fa2f282dd720ded16c987f75eb721273972a21e56b0194ce3a6c6d1ab8e

  • SSDEEP

    1536:me5jJLT8hn2Ep7WzPdVj6Ju8B3AZ242UdIAkD4x3HT4hPVoYdVQti6x9/F1spZ:me5jhE2EwR4uY41HyvYJ9/4Z

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9910eb24b4278bfccc225b9d0ddb314691f49e7681139a6db5fd2e318663087d.exe
    "C:\Users\Admin\AppData\Local\Temp\9910eb24b4278bfccc225b9d0ddb314691f49e7681139a6db5fd2e318663087d.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\g4e-u_gw.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2100
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCE58.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcCE57.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2276
    • C:\Users\Admin\AppData\Local\Temp\tmpCD7C.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpCD7C.tmp.exe" C:\Users\Admin\AppData\Local\Temp\9910eb24b4278bfccc225b9d0ddb314691f49e7681139a6db5fd2e318663087d.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2676

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESCE58.tmp

    Filesize

    1KB

    MD5

    cb154f59c02c3ba149527361ecbfa6d2

    SHA1

    bdca61f024db167013bed9f93e675e370c9c46f7

    SHA256

    85ef4db8451766fbd0dbf7943f1dd332f4495c5085f13047767f65f32e8058c1

    SHA512

    9766ff7b5719bf7eaa9d89bb2a353dd502f32247cdaedcef17423ce5c239729de0222ef89d63e59115d29fe91828273faa4f93f0b7cafdc217f770e9339795ac

  • C:\Users\Admin\AppData\Local\Temp\g4e-u_gw.0.vb

    Filesize

    14KB

    MD5

    cc9e181a10cbec8ba6e3af241382bd7c

    SHA1

    e613e220d1433179cc80228b21ac162c1b9fbd04

    SHA256

    4c71efa2605563cd94dd8863a963e902cd7320d1b4ffb30f4a2b7c4d4646f2f4

    SHA512

    eb0a83677fda47ea53e75297a9567c4f0d7ac8422ec56776511e0da7fcd13f7620b60711f9fd71f7212d3f7d4cd60e24a01e43ae8cf636b72a7f9e8a8b963047

  • C:\Users\Admin\AppData\Local\Temp\g4e-u_gw.cmdline

    Filesize

    266B

    MD5

    a68595d8cd034eefc4c358cb63f086d7

    SHA1

    4b83c6c207becde0bcd89ce2df574c483c879958

    SHA256

    77ec69ecef4e842a48498b167c53f08bb6daff30594c291697d5c8ce56e7e888

    SHA512

    999b18233298bac3386705a65d60cafbae48a51d061295658da5a6c7535b095e244aaded5767096ef82228279aa63cb64308c7826504754787328accfad536e1

  • C:\Users\Admin\AppData\Local\Temp\tmpCD7C.tmp.exe

    Filesize

    78KB

    MD5

    5ba6f57f15566bfaad39627a497cddda

    SHA1

    c6dc4be5f8cd7a0fd8c240af6b19fd352f7d0ad2

    SHA256

    0aad7ee0bcca63b339b8234038568e8c9f7bf9d76985e35e790ead4224ad9e4e

    SHA512

    57d8db0bcc89b4006a7e77673886c8390783e54ddf8884cfe89916aaeb55b231ad36e44b298cbf0c87132badb3876bfb6b51a7082ce3cb6a38a474aba6f8d8f6

  • C:\Users\Admin\AppData\Local\Temp\vbcCE57.tmp

    Filesize

    660B

    MD5

    20f2ef242f0d45f453b071e867cb27ae

    SHA1

    1df6c028327446292074be4411af3f206c1aaa58

    SHA256

    a050f2ff9f4b3a0deee2308fb4ec297748c030fb40d760f33e9ae783da3139aa

    SHA512

    a045564e00f5369d1fa0d5f66c8d40b616cd6fbe3367e519bf59f45333295a2f620bc618ef2d3ca192431e52ef10a59ceeb4e24751cc0cfc5b02ec43ad7360d4

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    6870a276e0bed6dd5394d178156ebad0

    SHA1

    9b6005e5771bb4afb93a8862b54fe77dc4d203ee

    SHA256

    69db906941dec2a7f1748ea1d15a058751c77d851ce54ea9e2ebdf1d6c7ed4f4

    SHA512

    3b6f412d4bdf0939677ab6890a6417da6f737376e13375d2a60871de195aa14344b8340d254b819c850d75a443629cbf26f35533e07aaba9532fdc5284132809

  • memory/2100-9-0x00000000748F0000-0x0000000074E9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2100-18-0x00000000748F0000-0x0000000074E9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2228-0-0x00000000748F1000-0x00000000748F2000-memory.dmp

    Filesize

    4KB

  • memory/2228-2-0x00000000748F0000-0x0000000074E9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2228-1-0x00000000748F0000-0x0000000074E9B000-memory.dmp

    Filesize

    5.7MB

  • memory/2228-24-0x00000000748F0000-0x0000000074E9B000-memory.dmp

    Filesize

    5.7MB