Analysis

  • max time kernel
    122s
  • max time network
    128s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 01:05

General

  • Target

    3f53aed02e3a0f3f353d1f644c769c768e9ea9ce3dbeeb708e8af3ee98b4b534.exe

  • Size

    553KB

  • MD5

    9696450d184ac26fbebff14339311e0e

  • SHA1

    7f39f6b5ba8f9874242b4d821bd13c1b8d45544c

  • SHA256

    3f53aed02e3a0f3f353d1f644c769c768e9ea9ce3dbeeb708e8af3ee98b4b534

  • SHA512

    9d3801148e2c938e0cf90de06aca6493d34b377b143e6941daac77955b4e48cc88be254058a93029aef31771f2be30942750fb93f397d84c7f23c790ae64adce

  • SSDEEP

    6144:CpY5xwJSajAqUCkOCqxxx4NJn/omgtqBtLX6WkSM:JcSa4Bqt4NJ/omgcHX6VP

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f53aed02e3a0f3f353d1f644c769c768e9ea9ce3dbeeb708e8af3ee98b4b534.exe
    "C:\Users\Admin\AppData\Local\Temp\3f53aed02e3a0f3f353d1f644c769c768e9ea9ce3dbeeb708e8af3ee98b4b534.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2216
    • C:\Users\Admin\AppData\Local\Temp\Ref.exe
      "C:\Users\Admin\AppData\Local\Temp\Ref.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5444
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5444 -s 1720
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:4264
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 1912
      2⤵
      • Program crash
      PID:5556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Ref.exe

    Filesize

    1.8MB

    MD5

    09d6a4bbf1c2b63b79ee2e15ff6ba692

    SHA1

    3b4f242f1b41d602dfa7a38c772fa9c56f658eb3

    SHA256

    9e887e21b114cfd3cf2f6a5e6f9e384412ef9d5744f0db71778105cd4bf9ddb0

    SHA512

    1f7a0056b6bf3e6e06dafdcf224dcfdf8902a43a73d72c56e0ee5c3fdf7a7cdc07a818a3aa4848cd86a7e3518cf13a8eaf34ded77d0239c02a32d81adc8c1abd

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Item.vbs

    Filesize

    79B

    MD5

    5cc6340ecfdd2252048d5726e4e4a3d3

    SHA1

    b625b1c7737b69e244a53fffc04e5952b1151727

    SHA256

    063d636ae20ea2b438e2c13e130d0f1848361eb30019208e2da7c0aaaeb3c17e

    SHA512

    a1c53dfbb21a87762d3d4753dede1dea63df88f520273de74ccfb4a522e97608b13e33e88c7ff78b5ac1a4887fdfac07641a3d66d50ebf8390cfd7149f5a4536

  • \??\c:\users\admin\appdata\roaming\item.exe

    Filesize

    553KB

    MD5

    9696450d184ac26fbebff14339311e0e

    SHA1

    7f39f6b5ba8f9874242b4d821bd13c1b8d45544c

    SHA256

    3f53aed02e3a0f3f353d1f644c769c768e9ea9ce3dbeeb708e8af3ee98b4b534

    SHA512

    9d3801148e2c938e0cf90de06aca6493d34b377b143e6941daac77955b4e48cc88be254058a93029aef31771f2be30942750fb93f397d84c7f23c790ae64adce

  • memory/2216-39-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-1-0x0000000000130000-0x00000000001BE000-memory.dmp

    Filesize

    568KB

  • memory/2216-7-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-17-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-41-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-67-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-65-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-63-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-1181-0x00000000058C0000-0x000000000590C000-memory.dmp

    Filesize

    304KB

  • memory/2216-1182-0x0000000074360000-0x0000000074A4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2216-1180-0x00000000066C0000-0x00000000067C0000-memory.dmp

    Filesize

    1024KB

  • memory/2216-61-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-59-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-57-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-55-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-53-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-51-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-49-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-1195-0x0000000005980000-0x00000000059D4000-memory.dmp

    Filesize

    336KB

  • memory/2216-1193-0x0000000074360000-0x0000000074A4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2216-1190-0x000000007436E000-0x000000007436F000-memory.dmp

    Filesize

    4KB

  • memory/2216-47-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-0-0x000000007436E000-0x000000007436F000-memory.dmp

    Filesize

    4KB

  • memory/2216-45-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-37-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-2-0x0000000074360000-0x0000000074A4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2216-43-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-35-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-3-0x0000000006530000-0x00000000066C0000-memory.dmp

    Filesize

    1.6MB

  • memory/2216-31-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-29-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-27-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-25-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-23-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-21-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-19-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-15-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-13-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-11-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-9-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-5-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-4-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/2216-1199-0x0000000074360000-0x0000000074A4E000-memory.dmp

    Filesize

    6.9MB

  • memory/2216-33-0x0000000006530000-0x00000000066BA000-memory.dmp

    Filesize

    1.5MB

  • memory/5444-1194-0x0000000074360000-0x0000000074A4E000-memory.dmp

    Filesize

    6.9MB

  • memory/5444-1191-0x0000000074360000-0x0000000074A4E000-memory.dmp

    Filesize

    6.9MB

  • memory/5444-1200-0x0000000006860000-0x00000000069EC000-memory.dmp

    Filesize

    1.5MB

  • memory/5444-1196-0x0000000000350000-0x0000000000358000-memory.dmp

    Filesize

    32KB

  • memory/5444-2378-0x0000000005370000-0x00000000053C4000-memory.dmp

    Filesize

    336KB

  • memory/5444-2377-0x00000000060F0000-0x00000000061EC000-memory.dmp

    Filesize

    1008KB

  • memory/5444-2383-0x0000000074360000-0x0000000074A4E000-memory.dmp

    Filesize

    6.9MB

  • memory/5444-1192-0x0000000001080000-0x000000000125A000-memory.dmp

    Filesize

    1.9MB

  • memory/5444-2389-0x0000000074360000-0x0000000074A4E000-memory.dmp

    Filesize

    6.9MB