Analysis

  • max time kernel
    90s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-12-2024 17:46

General

  • Target

    foo/06ed82e88e1f68cc08602d7cd8ec5f59.exe

  • Size

    12.2MB

  • MD5

    06ed82e88e1f68cc08602d7cd8ec5f59

  • SHA1

    37d4750e5f22cc395dd721dd5df73aeccc095bb5

  • SHA256

    43eebbd84e92a99b2bbca0b578df68dc07756e2c5fe908c668ac8c69f934a7e5

  • SHA512

    63060f8723b2ad50b8bfc225af22156215d5362bcf4a3ad77d9fe9059414b8ba69679f5fcf83159da224f165a83ebee74a306300f41205a887a06ec0bb86f895

  • SSDEEP

    196608:2JFxZy4WBmUKUKWQNAmLiytHFjF6LNniJassnr5wc+snazcQ50OvvVpSIK28sWBj:23xU4RUKUKJdtTmuc/HpovrK28h2PA

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\foo\06ed82e88e1f68cc08602d7cd8ec5f59.exe
    "C:\Users\Admin\AppData\Local\Temp\foo\06ed82e88e1f68cc08602d7cd8ec5f59.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    PID:5056
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5056 -s 1792
      2⤵
      • Program crash
      PID:3820
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5056 -ip 5056
    1⤵
      PID:2756

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\KPICAC2\TongJICNZZ.dll

      Filesize

      112KB

      MD5

      9b7d7dc19e849fd13fc600d8906b85f7

      SHA1

      65419e8b9fefe6d89f8b3d87445d021516381b88

      SHA256

      d3444b2dc03b38d2f96e2c8a33c63fe9817bf3508496a99c52da1ddeacfe50a9

      SHA512

      9eb3e023c9235e0a7587cadfb5562d3d1f35da5a0c5041e7a4fffb17f4fdd904f2dbf4ce43115635eba8dda2e768038e10704a7004d3f3bc00bf3ef8bc1295b5

    • C:\Users\Admin\AppData\Local\Temp\KPICAC2\unrar.dll

      Filesize

      180KB

      MD5

      10ac1f41330bd672957438c037f626f8

      SHA1

      e9b92821c5af98e4248b19aeffee6c12a1eb2bf8

      SHA256

      6822f3582ee4f91139ccd2a75aadf86d4e5faac7c8dbfce90327ac3685d880cc

      SHA512

      ce852b1ab470ab8c46160453876f90a0bb2e490b09d8e6de741733bae97cdcfa1878818e57d1a9ec42b0f6d9ce1916e33f2965664785a46f3ed9f7728ca29bf6