Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 01:10

General

  • Target

    3f53aed02e3a0f3f353d1f644c769c768e9ea9ce3dbeeb708e8af3ee98b4b534.exe

  • Size

    553KB

  • MD5

    9696450d184ac26fbebff14339311e0e

  • SHA1

    7f39f6b5ba8f9874242b4d821bd13c1b8d45544c

  • SHA256

    3f53aed02e3a0f3f353d1f644c769c768e9ea9ce3dbeeb708e8af3ee98b4b534

  • SHA512

    9d3801148e2c938e0cf90de06aca6493d34b377b143e6941daac77955b4e48cc88be254058a93029aef31771f2be30942750fb93f397d84c7f23c790ae64adce

  • SSDEEP

    6144:CpY5xwJSajAqUCkOCqxxx4NJn/omgtqBtLX6WkSM:JcSa4Bqt4NJ/omgcHX6VP

Score
7/10

Malware Config

Signatures

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3f53aed02e3a0f3f353d1f644c769c768e9ea9ce3dbeeb708e8af3ee98b4b534.exe
    "C:\Users\Admin\AppData\Local\Temp\3f53aed02e3a0f3f353d1f644c769c768e9ea9ce3dbeeb708e8af3ee98b4b534.exe"
    1⤵
    • Drops startup file
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Users\Admin\AppData\Local\Temp\Ref.exe
      "C:\Users\Admin\AppData\Local\Temp\Ref.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4596
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4596 -s 1712
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:4280
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 1916
      2⤵
      • Program crash
      PID:4712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Item.vbs

    Filesize

    79B

    MD5

    5cc6340ecfdd2252048d5726e4e4a3d3

    SHA1

    b625b1c7737b69e244a53fffc04e5952b1151727

    SHA256

    063d636ae20ea2b438e2c13e130d0f1848361eb30019208e2da7c0aaaeb3c17e

    SHA512

    a1c53dfbb21a87762d3d4753dede1dea63df88f520273de74ccfb4a522e97608b13e33e88c7ff78b5ac1a4887fdfac07641a3d66d50ebf8390cfd7149f5a4536

  • \Users\Admin\AppData\Local\Temp\Ref.exe

    Filesize

    1.8MB

    MD5

    09d6a4bbf1c2b63b79ee2e15ff6ba692

    SHA1

    3b4f242f1b41d602dfa7a38c772fa9c56f658eb3

    SHA256

    9e887e21b114cfd3cf2f6a5e6f9e384412ef9d5744f0db71778105cd4bf9ddb0

    SHA512

    1f7a0056b6bf3e6e06dafdcf224dcfdf8902a43a73d72c56e0ee5c3fdf7a7cdc07a818a3aa4848cd86a7e3518cf13a8eaf34ded77d0239c02a32d81adc8c1abd

  • memory/2368-51-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-1-0x0000000000210000-0x000000000029E000-memory.dmp

    Filesize

    568KB

  • memory/2368-4-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-25-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-27-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-23-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-21-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-19-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-17-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-15-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-13-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-11-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-9-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-7-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-5-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-41-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-59-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-67-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-65-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-63-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-61-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-57-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-55-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-54-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-47-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-49-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-0-0x000000007463E000-0x000000007463F000-memory.dmp

    Filesize

    4KB

  • memory/2368-3-0x00000000065E0000-0x0000000006770000-memory.dmp

    Filesize

    1.6MB

  • memory/2368-45-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-39-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-37-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-35-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-33-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-31-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-29-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-1181-0x0000000004C40000-0x0000000004C8C000-memory.dmp

    Filesize

    304KB

  • memory/2368-1180-0x0000000006770000-0x0000000006870000-memory.dmp

    Filesize

    1024KB

  • memory/2368-1182-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2368-2-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2368-1190-0x0000000005B20000-0x0000000005B74000-memory.dmp

    Filesize

    336KB

  • memory/2368-1191-0x000000007463E000-0x000000007463F000-memory.dmp

    Filesize

    4KB

  • memory/2368-43-0x00000000065E0000-0x000000000676A000-memory.dmp

    Filesize

    1.5MB

  • memory/2368-1199-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB

  • memory/2368-1197-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB

  • memory/4596-1198-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB

  • memory/4596-1195-0x00000000003A0000-0x00000000003A8000-memory.dmp

    Filesize

    32KB

  • memory/4596-1196-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB

  • memory/4596-1192-0x0000000000A70000-0x0000000000C4A000-memory.dmp

    Filesize

    1.9MB

  • memory/4596-2377-0x0000000006510000-0x000000000660C000-memory.dmp

    Filesize

    1008KB

  • memory/4596-2382-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB

  • memory/4596-1200-0x0000000006810000-0x000000000699C000-memory.dmp

    Filesize

    1.5MB

  • memory/4596-2388-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB

  • memory/4596-2389-0x0000000074630000-0x0000000074D1E000-memory.dmp

    Filesize

    6.9MB