Analysis

  • max time kernel
    112s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-12-2024 06:25

General

  • Target

    2e284063972d9c16b37eba5bf7503f6a79aab6dbc3f26b60627302be448f3897N.exe

  • Size

    6.0MB

  • MD5

    6b8c0e3bab587b028a11ef1aacc32b90

  • SHA1

    4c64932f679115a04005996fe7fec25984952cfb

  • SHA256

    2e284063972d9c16b37eba5bf7503f6a79aab6dbc3f26b60627302be448f3897

  • SHA512

    1e51f5f8262cabce43cd8176fdcfe78e4c796a2d840f3c6be93af559b8c8572a2496049ced6da0d76a7657d950e63b7c08bdf7254ef07ebd9f688825ad7beeb2

  • SSDEEP

    98304:zssvcXkkICDN8PEIvec1K88905+bUs9BAMgFhwvjEt88HoMyj6u2WRJtvT:tvc0khx8PScrkVjhgFhJ4Ksj

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 22 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 14 IoCs
  • Embeds OpenSSL 1 IoCs

    Embeds OpenSSL, may be used to circumvent TLS interception.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e284063972d9c16b37eba5bf7503f6a79aab6dbc3f26b60627302be448f3897N.exe
    "C:\Users\Admin\AppData\Local\Temp\2e284063972d9c16b37eba5bf7503f6a79aab6dbc3f26b60627302be448f3897N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1968
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup DVREMU2 Manager v1.0.0.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup DVREMU2 Manager v1.0.0.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1128
      • C:\Users\Admin\AppData\Local\Temp\is-2P95A.tmp\Setup DVREMU2 Manager v1.0.0.tmp
        "C:\Users\Admin\AppData\Local\Temp\is-2P95A.tmp\Setup DVREMU2 Manager v1.0.0.tmp" /SL5="$50196,7881415,121344,C:\Users\Admin\AppData\Local\Temp\RarSFX0\Setup DVREMU2 Manager v1.0.0.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2932
        • C:\Windows\SysWOW64\NOTEPAD.EXE
          "C:\Windows\system32\NOTEPAD.EXE" C:\Program Files\TEAM R2R\DVREMU2 Manager\Readme.txt
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1916
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\Resolveserves.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\Resolveserves.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:1164

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\TEAM R2R\DVREMU2 Manager\Readme.txt

    Filesize

    2KB

    MD5

    0de76ea95b6ecf3866d834fa1b078018

    SHA1

    69848f81de145ee8f2c5466aa87e6b7278018da7

    SHA256

    632e2772f9536a30dda7e1f61f267ccec1aac7dd5f568260377c0573570a32a8

    SHA512

    1c10ae889dbdad83b9bc135d2c1adc6de988d502624c2a3cf3cc08639bc3f07959a5ccecf4c5dd1a8e1f1581457ebe11a03b06493bc59052d54d967c104e6f6f

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\concrt140e.dll

    Filesize

    356KB

    MD5

    65e470fce7f5a938dabdc824f4a9756d

    SHA1

    da02412280511f8b5ec6978c24c3db9c91af1bc1

    SHA256

    aaea7473d3ab2ec37443981bd9e718cb74cae5d974ce02719aaf02dc3e041633

    SHA512

    13c98751fcd81c346fcdaf7805e58eaaa21fab487c67bd932d103b9513287d29b2f6e7686a3e317d4cb38fde5df18ff9718126744b74b01d180f4ffac803c4f2

  • C:\Users\Admin\AppData\Local\Temp\RarSFX0\libgcc_s_seh-1.dll

    Filesize

    93KB

    MD5

    9de67adc52e42f99ec6e8e2efb6c416f

    SHA1

    1586fdb1979736e82b96d183d7fee15a53b32226

    SHA256

    f34e2fb573e1eac888496799de3a391e4f5162e250cf4fd93ebab28da4b3b6d8

    SHA512

    2bcc06144cbf682da67573f62c922c9ac4bb15e617a836645e73e059f9a26f4ee03b162ba4c3b655d1911c28493435294928a55af4edfa3e81bdbef2ee4103b1

  • \Program Files\TEAM R2R\DVREMU2 Manager\DVREMU2MAN.exe

    Filesize

    102KB

    MD5

    2a052d9b7bdd115e24b7bc4b8475edce

    SHA1

    2018370cf1cb6e8fdefab2444c086bc98a39e99a

    SHA256

    2083beb78b4ceba4a8fe819ed2307b4c0a22622f32caea60fcea7de0bcbd76b8

    SHA512

    85eab43585c93fcd2456593beca8664f74c22203baab67aac284cf34220be109aa4a7e71da795617d39d7f4a09c68e8452901be3f277a5f73f96661e64812348

  • \Program Files\TEAM R2R\DVREMU2 Manager\unins000.exe

    Filesize

    1.2MB

    MD5

    908f64b344bce85c344e88db0c4c334f

    SHA1

    b917238e7bd8176a6bc34664fad61f95bc9b6cb0

    SHA256

    6bdc1c8f0a1bd5951e94f575e6b693d0150d25f3b62bc7314567b2c4c3a8f009

    SHA512

    9e1a4ff4a92f939f9f0ae65b3e23ebfdb1fd2d6d567fc555579abe4ba67221a91585459e017c4565b562ce85f611ff1f2cceec70bb4b74697ed1c06d26e70a0c

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Resolveserves.exe

    Filesize

    1.5MB

    MD5

    16ef27011883d9e9f9ae7e7a871e25be

    SHA1

    7f579bada6cb595102dbfb260f0921d46389d697

    SHA256

    6566264df2eed3e76803f4ec9e494a928fda85efe00b8b0a83702fa244fb0a26

    SHA512

    13529f1b13c10a2539a31d7d4df1060d6ff173c34ca7a508f7bf8e8167158509a3dd730e2ea388eff7cbcd99c7fb23a6361818cbb63beafa471e45bcbae9d8ff

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Setup DVREMU2 Manager v1.0.0.exe

    Filesize

    7.9MB

    MD5

    712694288f0a36efead1b9ba8b4c0ab0

    SHA1

    543a71e15c14cb6a080f16aea554ec2f5257d6c7

    SHA256

    8d31d34083335dc0cc3c76bd5f418846e8f4daad5a437cefd8e47df332401b08

    SHA512

    aa73c45724196a4e7b171c403c69b7c84fbe2550e245a6bc8c0c24d4b9f474e5d0d6aef0cbe7aa7d916630c2245161066516055c9567959f01baed093f4c7b65

  • \Users\Admin\AppData\Local\Temp\RarSFX0\Torchtray.dll

    Filesize

    2.7MB

    MD5

    7b27ce839ce147f86c63f0ae10b0ee27

    SHA1

    88f8a898aaf9f6d1ddd33ecb86a9e6b9f5f9d74f

    SHA256

    a2b6c9520fc290f3ac3b170743d06c9131f84d5e448b0c3573638507b1b626ec

    SHA512

    36e024db17ba61d091393bbcdd6a3653d11a89bc702273cc1003a53e3690d60eaeb6421038ba214ac5dc19e2769f37e4831ec4ec9273d14ad15555fb0726b144

  • \Users\Admin\AppData\Local\Temp\RarSFX0\libstdc++-6.dll

    Filesize

    983KB

    MD5

    e19223a1728e37265938696b99a2f740

    SHA1

    d0607aa523de5f562c889734c64dd533baacd37b

    SHA256

    d1d0c1899eb497f8a3d3d2e7b7096ed85176d1cf96f651f24bad0a762a194e90

    SHA512

    555b102c79be2ff55843eb8d1a36c4260145625f5e471ff0e7d0c3f6987773917a949e32b4cb94dbfb8a66c7bf56420f331a791dfe75ed2c3e0675277fa4c94c

  • \Users\Admin\AppData\Local\Temp\RarSFX0\libwinpthread-1.dll

    Filesize

    2.0MB

    MD5

    d28fdc37f8ad7a79326752c5cd8ffa0c

    SHA1

    23956581ba8055419300ebe46daaaedf46ca0bfa

    SHA256

    7ca8142b91c84285116f8d57f57d9f6d9b06e96c933d5f0fb8f3b2180363ffb8

    SHA512

    eacd56b203483e8e0ad6b026df035811a7f104c788a33835a35709fc3e541e960226399cef60793a0113461f86b6cd87e367023f27f688608b83e93383e2b6a1

  • \Users\Admin\AppData\Local\Temp\is-2P95A.tmp\Setup DVREMU2 Manager v1.0.0.tmp

    Filesize

    1.1MB

    MD5

    34acc2bdb45a9c436181426828c4cb49

    SHA1

    5adaa1ac822e6128b8d4b59a54d19901880452ae

    SHA256

    9c81817acd4982632d8c7f1df3898fca1477577738184265d735f49fc5480f07

    SHA512

    134ff4022571efd46f7a62e99b857ebe834e9916c786345908010f9e1fb90be226b740ddee16ae9290fe45c86be7238c4555e422abe66a461d11545e19734beb

  • \Users\Admin\AppData\Local\Temp\is-N4JTS.tmp\ISSKINU.DLL

    Filesize

    357KB

    MD5

    f30afccd6fafc1cad4567ada824c9358

    SHA1

    60a65b72f208563f90fba0da6af013a36707caa9

    SHA256

    e28d16fad16bca8198c47d7dd44acfd362dd6ba1654f700add8aaf2c0732622d

    SHA512

    59b199085ed4b59ef2b385a09d0901ff2efde7b344db1e900684a425fc2df8e2010ca73d2f2bffa547040cb1dd4c8938b175c463ccc5e39a840a19f9aa301a6c

  • \Users\Admin\AppData\Local\Temp\is-N4JTS.tmp\R2RINNO.dll

    Filesize

    4KB

    MD5

    5df8ada84a16f5dfc24096ef90a5ce3a

    SHA1

    5e7e9c68119c3a0a1afc92c60674bc8714492823

    SHA256

    48a9c8c332fde541b571d9d522d0e37834b452f55af8cbdc341b12222e78fb5b

    SHA512

    661b5219c74dd6e3a8e899a1b1a3002689d148e337d7323a174519366c9548c284ee76e2faa2f9600cd483db21093ee62399f0d7403c39523c654266760191c2

  • \Users\Admin\AppData\Local\Temp\is-N4JTS.tmp\SKIN.CJSTYLES

    Filesize

    813KB

    MD5

    5f87caf3f7cf63dde8e6af53bdf31289

    SHA1

    a2c3cc3d9d831acd797155b667db59a32000d7a8

    SHA256

    4731982b02b067d3f5a5a7518279a9265a49fb0f7b3f8dc3d61b82a5359d4940

    SHA512

    4875298d82037ef1fff1ee3c58a9059d8480274326c862729fcc56664ecb49e2692c3838948c66dc8336e4050469d831cbf1fbd79b66565ab673d2a67765109d

  • memory/1128-33-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1128-36-0x0000000000401000-0x0000000000412000-memory.dmp

    Filesize

    68KB

  • memory/2932-91-0x0000000074350000-0x0000000074362000-memory.dmp

    Filesize

    72KB

  • memory/2932-96-0x0000000074C20000-0x0000000074C33000-memory.dmp

    Filesize

    76KB

  • memory/2932-64-0x0000000074080000-0x00000000740B2000-memory.dmp

    Filesize

    200KB

  • memory/2932-63-0x0000000076170000-0x000000007619A000-memory.dmp

    Filesize

    168KB

  • memory/2932-59-0x0000000076340000-0x0000000076F8A000-memory.dmp

    Filesize

    12.3MB

  • memory/2932-65-0x0000000074420000-0x0000000074515000-memory.dmp

    Filesize

    980KB

  • memory/2932-67-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2932-68-0x0000000075490000-0x000000007551F000-memory.dmp

    Filesize

    572KB

  • memory/2932-71-0x0000000074C80000-0x0000000074C89000-memory.dmp

    Filesize

    36KB

  • memory/2932-69-0x00000000751E0000-0x000000007533C000-memory.dmp

    Filesize

    1.4MB

  • memory/2932-66-0x0000000074E80000-0x000000007501D000-memory.dmp

    Filesize

    1.6MB

  • memory/2932-70-0x0000000075A90000-0x0000000075B30000-memory.dmp

    Filesize

    640KB

  • memory/2932-73-0x0000000074E20000-0x0000000074E77000-memory.dmp

    Filesize

    348KB

  • memory/2932-72-0x00000000746E0000-0x000000007487E000-memory.dmp

    Filesize

    1.6MB

  • memory/2932-75-0x0000000075A10000-0x0000000075A8B000-memory.dmp

    Filesize

    492KB

  • memory/2932-74-0x0000000076340000-0x0000000076F8A000-memory.dmp

    Filesize

    12.3MB

  • memory/2932-80-0x00000000742C0000-0x00000000742D7000-memory.dmp

    Filesize

    92KB

  • memory/2932-81-0x0000000074150000-0x000000007426F000-memory.dmp

    Filesize

    1.1MB

  • memory/2932-79-0x00000000742E0000-0x0000000074318000-memory.dmp

    Filesize

    224KB

  • memory/2932-78-0x0000000075620000-0x00000000756A3000-memory.dmp

    Filesize

    524KB

  • memory/2932-82-0x0000000074080000-0x00000000740B2000-memory.dmp

    Filesize

    200KB

  • memory/2932-84-0x0000000074420000-0x0000000074515000-memory.dmp

    Filesize

    980KB

  • memory/2932-93-0x0000000074E20000-0x0000000074E77000-memory.dmp

    Filesize

    348KB

  • memory/2932-85-0x0000000074E80000-0x000000007501D000-memory.dmp

    Filesize

    1.6MB

  • memory/2932-61-0x0000000074150000-0x000000007426F000-memory.dmp

    Filesize

    1.1MB

  • memory/2932-90-0x0000000075950000-0x00000000759ED000-memory.dmp

    Filesize

    628KB

  • memory/2932-102-0x0000000074E80000-0x000000007501D000-memory.dmp

    Filesize

    1.6MB

  • memory/2932-101-0x0000000074420000-0x0000000074515000-memory.dmp

    Filesize

    980KB

  • memory/2932-100-0x0000000074000000-0x0000000074039000-memory.dmp

    Filesize

    228KB

  • memory/2932-99-0x0000000074080000-0x00000000740B2000-memory.dmp

    Filesize

    200KB

  • memory/2932-98-0x00000000740C0000-0x000000007414C000-memory.dmp

    Filesize

    560KB

  • memory/2932-97-0x0000000075620000-0x00000000756A3000-memory.dmp

    Filesize

    524KB

  • memory/2932-109-0x0000000074E20000-0x0000000074E77000-memory.dmp

    Filesize

    348KB

  • memory/2932-62-0x00000000740C0000-0x000000007414C000-memory.dmp

    Filesize

    560KB

  • memory/2932-94-0x0000000075A10000-0x0000000075A8B000-memory.dmp

    Filesize

    492KB

  • memory/2932-92-0x00000000746E0000-0x000000007487E000-memory.dmp

    Filesize

    1.6MB

  • memory/2932-89-0x0000000075A90000-0x0000000075B30000-memory.dmp

    Filesize

    640KB

  • memory/2932-88-0x0000000075490000-0x000000007551F000-memory.dmp

    Filesize

    572KB

  • memory/2932-87-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2932-86-0x0000000073F70000-0x0000000073FA6000-memory.dmp

    Filesize

    216KB

  • memory/2932-83-0x0000000074000000-0x0000000074039000-memory.dmp

    Filesize

    228KB

  • memory/2932-104-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2932-108-0x00000000746E0000-0x000000007487E000-memory.dmp

    Filesize

    1.6MB

  • memory/2932-114-0x0000000074000000-0x0000000074039000-memory.dmp

    Filesize

    228KB

  • memory/2932-115-0x0000000074420000-0x0000000074515000-memory.dmp

    Filesize

    980KB

  • memory/2932-113-0x0000000074080000-0x00000000740B2000-memory.dmp

    Filesize

    200KB

  • memory/2932-112-0x00000000740C0000-0x000000007414C000-memory.dmp

    Filesize

    560KB

  • memory/2932-116-0x0000000074E80000-0x000000007501D000-memory.dmp

    Filesize

    1.6MB

  • memory/2932-118-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2932-117-0x0000000073F70000-0x0000000073FA6000-memory.dmp

    Filesize

    216KB

  • memory/2932-111-0x0000000075620000-0x00000000756A3000-memory.dmp

    Filesize

    524KB

  • memory/2932-107-0x0000000074350000-0x0000000074362000-memory.dmp

    Filesize

    72KB

  • memory/2932-106-0x0000000074C80000-0x0000000074C89000-memory.dmp

    Filesize

    36KB

  • memory/2932-105-0x0000000075A90000-0x0000000075B30000-memory.dmp

    Filesize

    640KB

  • memory/2932-103-0x0000000075340000-0x0000000075367000-memory.dmp

    Filesize

    156KB

  • memory/2932-60-0x00000000742E0000-0x0000000074318000-memory.dmp

    Filesize

    224KB

  • memory/2932-57-0x0000000075950000-0x00000000759ED000-memory.dmp

    Filesize

    628KB

  • memory/2932-311-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-613-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB

  • memory/2932-58-0x0000000074E20000-0x0000000074E77000-memory.dmp

    Filesize

    348KB

  • memory/2932-56-0x0000000075A90000-0x0000000075B30000-memory.dmp

    Filesize

    640KB

  • memory/2932-55-0x00000000751E0000-0x000000007533C000-memory.dmp

    Filesize

    1.4MB

  • memory/2932-54-0x0000000075490000-0x000000007551F000-memory.dmp

    Filesize

    572KB

  • memory/2932-50-0x0000000010000000-0x0000000010061000-memory.dmp

    Filesize

    388KB

  • memory/2932-42-0x0000000000400000-0x000000000052E000-memory.dmp

    Filesize

    1.2MB