Analysis

  • max time kernel
    71s
  • max time network
    67s
  • platform
    windows11-21h2_x64
  • resource
    win11-20241007-en
  • resource tags

    arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    08-12-2024 15:59

General

  • Target

    net45.zip

  • Size

    17.7MB

  • MD5

    d433a1576c281261963e39ead71baf6a

  • SHA1

    f5b5ceb009366f221635deffe24bfff4bba863b8

  • SHA256

    23a2c144b274eacd5e0173cd4465bb0ca4d6382676ea3aa5e9408a4ba4f24321

  • SHA512

    73012415f36294bf6e50f75108038039b820880d3d72077d401eae23776a4d8477eb234a1a23b233c0288788a8f4901502efe331079a680d191b84c804e95fcd

  • SSDEEP

    393216:Q9FiQ33r3EbAeIo6rJTXYTVtpJ8vgMGOQxZ7OlIzqWaG2CPpHpg:QvNgbHGZclqgJOGq5Gpg

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs

Processes

  • C:\Program Files\7-Zip\7zFM.exe
    "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\net45.zip"
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:2352
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:1088
    • C:\Users\Admin\Desktop\net45\XWorm.exe
      "C:\Users\Admin\Desktop\net45\XWorm.exe"
      1⤵
      • Executes dropped EXE
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3000
    • C:\Windows\system32\wbem\WmiApSrv.exe
      C:\Windows\system32\wbem\WmiApSrv.exe
      1⤵
        PID:4908
      • C:\Windows\system32\AUDIODG.EXE
        C:\Windows\system32\AUDIODG.EXE 0x0000000000000488 0x00000000000004E8
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:4524

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\7zE03965AF7\net45\Icons\icon (15).ico

        Filesize

        361KB

        MD5

        e3143e8c70427a56dac73a808cba0c79

        SHA1

        63556c7ad9e778d5bd9092f834b5cc751e419d16

        SHA256

        b2f57a23ecc789c1bbf6037ac0825bf98babc7bf0c5d438af5e2767a27a79188

        SHA512

        74e0f4b55625df86a87b9315e4007be8e05bbecca4346a6ea06ef5b1528acb5a8bb636ef3e599a3820dbddcf69563a0a22e2c1062c965544fd75ec96fd9803fc

      • C:\Users\Admin\Desktop\net45\GeoIP.dat

        Filesize

        1.2MB

        MD5

        8ef41798df108ce9bd41382c9721b1c9

        SHA1

        1e6227635a12039f4d380531b032bf773f0e6de0

        SHA256

        bc07ff22d4ee0b6fafcc12482ecf2981c172a672194c647cedf9b4d215ad9740

        SHA512

        4c62af04d4a141b94eb3e1b0dbf3669cb53fe9b942072ed7bea6a848d87d8994cff5a5f639ab70f424eb79a4b7adabdde4da6d2f02f995bd8d55db23ce99f01b

      • C:\Users\Admin\Desktop\net45\Guna.UI2.dll

        Filesize

        1.9MB

        MD5

        bcc0fe2b28edd2da651388f84599059b

        SHA1

        44d7756708aafa08730ca9dbdc01091790940a4f

        SHA256

        c6264665a882e73eb2262a74fea2c29b1921a9af33180126325fb67a851310ef

        SHA512

        3bfc3d27c095dde988f779021d0479c8c1de80a404454813c6cae663e3fe63dc636bffa7de1094e18594c9d608fa7420a0651509544722f2a00288f0b7719cc8

      • C:\Users\Admin\Desktop\net45\Sounds\Intro.wav

        Filesize

        238KB

        MD5

        ad3b4fae17bcabc254df49f5e76b87a6

        SHA1

        1683ff029eebaffdc7a4827827da7bb361c8747e

        SHA256

        e3e5029bf5f29fa32d2f6cdda35697cd8e6035d5c78615f64d0b305d1bd926cf

        SHA512

        3d6ecc9040b5079402229c214cb5f9354315131a630c43d1da95248edc1b97627fb9ba032d006380a67409619763fb91976295f8d22ca91894c88f38bb610cd3

      • C:\Users\Admin\Desktop\net45\XWorm.exe

        Filesize

        13.1MB

        MD5

        e1324bb8e8608615a53666aa4814f76a

        SHA1

        5eb5ad414474c156720a0c96776d60d11591b68a

        SHA256

        5b8de84b5f74453ebc5d898e6367009286bdf15f86ca36620242c48f41596bad

        SHA512

        b79f58e355ca313c59e2470ed49838156be2a9918b1497728a1f63c4df1616fda4d11d66afe3a5ceaccc6a56ff8e63d544b0d0cb485f31dd2a37c0b270a86e04

      • C:\Users\Admin\Desktop\net45\XWorm.exe.config

        Filesize

        174B

        MD5

        da07c2af754c1b46c1f46beb4a5cd5c9

        SHA1

        fef14bd01149ed451d6e405af38369ce5c3ae187

        SHA256

        60fda282bbc1aeb836b158dd6dde523e5225b365cc6fc0338dab9e82347b1e2d

        SHA512

        f9ca0b8834b74aed39219d087f0f702a4f32be1554c6af3f2338dba9d793462ed638fdf0739b7809d8cd35593970eadff558b468093df7f5e536e8550ef88d6c

      • memory/3000-149-0x00007FFB676F3000-0x00007FFB676F5000-memory.dmp

        Filesize

        8KB

      • memory/3000-150-0x0000028BBD880000-0x0000028BBE598000-memory.dmp

        Filesize

        13.1MB

      • memory/3000-152-0x0000028BD9000000-0x0000028BD91F4000-memory.dmp

        Filesize

        2.0MB

      • memory/3000-153-0x00007FFB676F0000-0x00007FFB681B2000-memory.dmp

        Filesize

        10.8MB

      • memory/3000-155-0x00007FFB676F3000-0x00007FFB676F5000-memory.dmp

        Filesize

        8KB

      • memory/3000-157-0x00007FFB676F0000-0x00007FFB681B2000-memory.dmp

        Filesize

        10.8MB