Analysis
-
max time kernel
45s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-12-2024 13:14
Behavioral task
behavioral1
Sample
release.zip
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
release.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Release/Discord rat.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
Release/Discord rat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
builder.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
builder.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
dnlib.dll
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
dnlib.dll
Resource
win10v2004-20241007-en
General
-
Target
release.zip
-
Size
445KB
-
MD5
06a4fcd5eb3a39d7f50a0709de9900db
-
SHA1
50d089e915f69313a5187569cda4e6dec2d55ca7
-
SHA256
c13a0cd7c2c2fd577703bff026b72ed81b51266afa047328c8ff1c4a4d965c97
-
SHA512
75e5f637fd3282d088b1c0c1efd0de8a128f681e4ac66d6303d205471fe68b4fbf0356a21d803aff2cca6def455abad8619fedc8c7d51e574640eda0df561f9b
-
SSDEEP
12288:BfJ13+GoLo2d5ifXHE8134QwYOwFSFRiLQI:BKGo8EifSQwYWI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2816 builder.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language builder.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1236 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1236 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeRestorePrivilege 1236 7zFM.exe Token: 35 1236 7zFM.exe Token: SeSecurityPrivilege 1236 7zFM.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1236 7zFM.exe 1236 7zFM.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1236 wrote to memory of 2816 1236 7zFM.exe 29 PID 1236 wrote to memory of 2816 1236 7zFM.exe 29 PID 1236 wrote to memory of 2816 1236 7zFM.exe 29 PID 1236 wrote to memory of 2816 1236 7zFM.exe 29
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\release.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\7zO4D47DC88\builder.exe"C:\Users\Admin\AppData\Local\Temp\7zO4D47DC88\builder.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD54f04f0e1ff050abf6f1696be1e8bb039
SHA1bebf3088fff4595bfb53aea6af11741946bbd9ce
SHA256ded51c306ee7e59fa15c42798c80f988f6310ea77ab77de3d12dc01233757cfa
SHA51294713824b81de323e368fde18679ef8b8f2883378bffd2b7bd2b4e4bd5d48b35c6e71c9f8e9b058ba497db1bd0781807e5b7cecfd540dad611da0986c72b9f12