Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    11-12-2024 01:17

General

  • Target

    1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe

  • Size

    136.8MB

  • MD5

    97c8ec5f8f8a330a8d130ac06369dea3

  • SHA1

    62e2814a10161ad137935d568acafe60467861ad

  • SHA256

    1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5

  • SHA512

    2ef10ceae9c07f3b30adb71b9807565bde35c1e53f20aebfa70d97b68dc124d2962f2def2db27809e496a26fbd19003297c695cacb7e79ebc83ab18379e3e926

  • SSDEEP

    3145728:ATOs6vohFseEWHuMko0zNUiV4vGwhZzAhau4kB5w+r:A6BvoTseEWORJg4auKY

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 8 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 38 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 7 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 12 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 35 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe
    "C:\Users\Admin\AppData\Local\Temp\1f6907229ef8b63bff8befeab77a0393d8b1a0385718b1c480cfaedfe42298d5.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2924
    • C:\Users\Admin\AppData\Local\Temp\nofkv.exe
      "C:\Users\Admin\AppData\Local\Temp\nofkv.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2908
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ping -n 2 127.0.0.1 > nul && del C:\Users\Admin\AppData\Local\Temp\nofkv.exe > nul
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Suspicious use of WriteProcessMemory
        PID:3096
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 2 127.0.0.1
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:6232
    • C:\Users\Admin\AppData\Local\Temp\LineInst.exe
      "C:\Users\Admin\AppData\Local\Temp\LineInst.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2688
  • C:\Windows\SysWOW64\Kbskb.exe
    C:\Windows\SysWOW64\Kbskb.exe -auto
    1⤵
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:12684
    • C:\Windows\SysWOW64\Kbskb.exe
      C:\Windows\SysWOW64\Kbskb.exe -acsi
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\2d26WUhOmmpG.exe

    Filesize

    4.6MB

    MD5

    7a267dc934ef6484d157bfec4478071a

    SHA1

    5a8a4053e50a777c5f80fe3b3ddf310bb19e123a

    SHA256

    90eec722f91e4bb4267d598d23d82e99f218972b4d9deb02843e4db4eed96642

    SHA512

    1e633b8557dbd6ac91b201c69fcb4ed6aae27858b369f26d1244a75826f693ba46eb30f6fd4c4d5bd4a780453dc52f282c3d40289dec4902bd4b316fea5af645

  • C:\Users\Admin\AppData\Local\Temp\LineInst.exe

    Filesize

    1004KB

    MD5

    587e3bc21efaf428c87331decc9bfeb3

    SHA1

    a5b8ebeab4e3968673a61a95350b7f0bf60d7459

    SHA256

    b931c5686cc09b2183bba197dc151b8e95ca6151e39fb98954352340c0b31120

    SHA512

    ffae2dab5caf16dc7dfd0a97a8ff6349a466bc57ee043d1ac4d53e011498e39b9a855295d10207ba578c6857abebd445d378e83aa2ff6ec247713d81b370d0ca

  • \Users\Admin\AppData\Local\Temp\nofkv.exe

    Filesize

    27.4MB

    MD5

    1f966ad98da8e945a465dfd17be0d5d4

    SHA1

    73736700af96c7086e359d17f611dc9d135defca

    SHA256

    8952d09c0acb5baa90c0418b35da93d623249194385983f2e3e402d51c77db7a

    SHA512

    6138b636aacdbeb70fc9b4352b8b2dabe9d4c3fbbf457b0d7b88d2d4c922a22c3f95ef0d24ca0b407dfd447f202a8e6aa017dd2f249f3593ce0f7e668b764318

  • memory/2908-877-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-905-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-881-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-879-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-852-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-853-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-855-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-857-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-859-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-861-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-863-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-865-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-867-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-869-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-871-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-873-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-875-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-907-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-42-0x0000000075870000-0x00000000758B7000-memory.dmp

    Filesize

    284KB

  • memory/2908-909-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-885-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-883-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-887-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-889-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-901-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-900-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-897-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-895-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-893-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-891-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-903-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-913-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2908-911-0x0000000003CB0000-0x0000000003DC1000-memory.dmp

    Filesize

    1.1MB

  • memory/2924-41-0x00000000057F0000-0x000000000734A000-memory.dmp

    Filesize

    27.4MB

  • memory/2924-26-0x00000000057F0000-0x000000000734A000-memory.dmp

    Filesize

    27.4MB

  • memory/2924-25-0x00000000057F0000-0x000000000734A000-memory.dmp

    Filesize

    27.4MB

  • memory/2924-26156-0x00000000057F0000-0x000000000734A000-memory.dmp

    Filesize

    27.4MB