Analysis

  • max time kernel
    137s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    12-12-2024 02:50

General

  • Target

    dfdc0318f3dc5ba3f960b1f338b638cd9645856d2a2af8aa33ea0f9979a9ca4c.exe

  • Size

    437KB

  • MD5

    d317ee086ebeccf5e01e002ca6b0ead9

  • SHA1

    48e8c5846d9c67649b3c2fb8d76aa951828dd84e

  • SHA256

    dfdc0318f3dc5ba3f960b1f338b638cd9645856d2a2af8aa33ea0f9979a9ca4c

  • SHA512

    5fc335758f587e9f9f35309b101c16a4e2faa840013f8024f45eb33b9aa402a2877cbc07f76f389d25e2cf20607486997218de52c46364e2c89a5fa28a785032

  • SSDEEP

    12288:fHxmm31uLFn23TURCwbH8SnBkKuJ+RctSaWrQz:/BuLFn2DUELSS7s

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dfdc0318f3dc5ba3f960b1f338b638cd9645856d2a2af8aa33ea0f9979a9ca4c.exe
    "C:\Users\Admin\AppData\Local\Temp\dfdc0318f3dc5ba3f960b1f338b638cd9645856d2a2af8aa33ea0f9979a9ca4c.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe
      "C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2428

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\163522206146

    Filesize

    76KB

    MD5

    c7da784f0a7d2098552d365571c8cbf7

    SHA1

    c0dcb85ed987001009b573225294f28cad0a0b57

    SHA256

    23519a705e01e22ede9b83f1fb023e027b95df5ceb341729a78a16027bbb5254

    SHA512

    c35c7ce9a488ae47af27fcc2aa72d7e932a2c1dfcc31ea985a61694328be00c550e8fbd3c1ba522a132e54190ff7d603da618f1ed24a5b0f11b5578a977419d0

  • C:\Users\Admin\AppData\Local\Temp\431a343abc\Dctooux.exe

    Filesize

    437KB

    MD5

    d317ee086ebeccf5e01e002ca6b0ead9

    SHA1

    48e8c5846d9c67649b3c2fb8d76aa951828dd84e

    SHA256

    dfdc0318f3dc5ba3f960b1f338b638cd9645856d2a2af8aa33ea0f9979a9ca4c

    SHA512

    5fc335758f587e9f9f35309b101c16a4e2faa840013f8024f45eb33b9aa402a2877cbc07f76f389d25e2cf20607486997218de52c46364e2c89a5fa28a785032

  • C:\Users\Admin\AppData\Roaming\bfbcc7a80c10a7\cred64.dll

    Filesize

    4KB

    MD5

    f5d536eb9e23415b3abe8bb20cfdbb68

    SHA1

    1f39c51db15ed4e9753d2544ae253a3f4de28c85

    SHA256

    e4b2bfb749a07b4faafc616493cfc7f965d4750e4742673c51331bf3cb173c1d

    SHA512

    d9b1adbd72cfd14e759ff730f45a41b93932960a811173f2664f68544726212922bdf40aea0de35e17f58c3865fd52678c222be636e3464f3431eefcae50606b

  • memory/2580-1-0x0000000000460000-0x0000000000461000-memory.dmp

    Filesize

    4KB