Analysis
-
max time kernel
121s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 23:05
Behavioral task
behavioral1
Sample
448166ffa55d2d5fbf0cfaefb21826f6.exe
Resource
win7-20240708-en
General
-
Target
448166ffa55d2d5fbf0cfaefb21826f6.exe
-
Size
118.6MB
-
MD5
448166ffa55d2d5fbf0cfaefb21826f6
-
SHA1
e946af3ab6614f0b20515a3fa8b5a73210e8932d
-
SHA256
a69ac6cbe1ce50215d3f6df173f38bb3f9de174d32c87afbb7146662214b570b
-
SHA512
d9147720d3e691091c8a376776429eee992ab7a1b656109b091892483200b71606242dff085ca705807f081703ac7d182150f631a657c6a2d568b67b9bb32d55
-
SSDEEP
1572864:6ruifSIvT79HWXIIbgpGB+GrqxVb0al/VlK8vlQO:6fpTwWGBGdPvZ
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp 2996 makecat.exe 816 link.exe -
Loads dropped DLL 22 IoCs
pid Process 3052 448166ffa55d2d5fbf0cfaefb21826f6.exe 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp 816 link.exe 816 link.exe 816 link.exe 816 link.exe 816 link.exe 816 link.exe 816 link.exe 816 link.exe 816 link.exe 816 link.exe 816 link.exe 816 link.exe 816 link.exe 816 link.exe 816 link.exe 816 link.exe 816 link.exe 816 link.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 448166ffa55d2d5fbf0cfaefb21826f6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 448166ffa55d2d5fbf0cfaefb21826f6.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language makecat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language link.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2656 3052 448166ffa55d2d5fbf0cfaefb21826f6.exe 30 PID 3052 wrote to memory of 2656 3052 448166ffa55d2d5fbf0cfaefb21826f6.exe 30 PID 3052 wrote to memory of 2656 3052 448166ffa55d2d5fbf0cfaefb21826f6.exe 30 PID 3052 wrote to memory of 2656 3052 448166ffa55d2d5fbf0cfaefb21826f6.exe 30 PID 3052 wrote to memory of 2656 3052 448166ffa55d2d5fbf0cfaefb21826f6.exe 30 PID 3052 wrote to memory of 2656 3052 448166ffa55d2d5fbf0cfaefb21826f6.exe 30 PID 3052 wrote to memory of 2656 3052 448166ffa55d2d5fbf0cfaefb21826f6.exe 30 PID 2656 wrote to memory of 2996 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp 31 PID 2656 wrote to memory of 2996 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp 31 PID 2656 wrote to memory of 2996 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp 31 PID 2656 wrote to memory of 2996 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp 31 PID 2656 wrote to memory of 816 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp 33 PID 2656 wrote to memory of 816 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp 33 PID 2656 wrote to memory of 816 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp 33 PID 2656 wrote to memory of 816 2656 448166ffa55d2d5fbf0cfaefb21826f6.tmp 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\448166ffa55d2d5fbf0cfaefb21826f6.exe"C:\Users\Admin\AppData\Local\Temp\448166ffa55d2d5fbf0cfaefb21826f6.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\is-GVSSR.tmp\448166ffa55d2d5fbf0cfaefb21826f6.tmp"C:\Users\Admin\AppData\Local\Temp\is-GVSSR.tmp\448166ffa55d2d5fbf0cfaefb21826f6.tmp" /SL5="$4010A,123570416,887296,C:\Users\Admin\AppData\Local\Temp\448166ffa55d2d5fbf0cfaefb21826f6.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Roaming\MiPony Installer\makecat.exe"C:\Users\Admin\AppData\Roaming\MiPony Installer\makecat.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2996
-
-
C:\Users\Admin\AppData\Roaming\MiPony Installer\link.exe"C:\Users\Admin\AppData\Roaming\MiPony Installer\link.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
429KB
MD51d8c79f293ca86e8857149fb4efe4452
SHA17474e7a5cb9c79c4b99fdf9fb50ef3011bef7e8f
SHA256c09b126e7d4c1e6efb3ffcda2358252ce37383572c78e56ca97497a7f7c793e4
SHA51283c4d842d4b07ba5cec559b6cd1c22ab8201941a667e7b173c405d2fc8862f7e5d9703e14bd7a1babd75165c30e1a2c95f9d1648f318340ea5e2b145d54919b1
-
Filesize
83KB
MD5b77eeaeaf5f8493189b89852f3a7a712
SHA1c40cf51c2eadb070a570b969b0525dc3fb684339
SHA256b7c13f8519340257ba6ae3129afce961f137e394dde3e4e41971b9f912355f5e
SHA512a09a1b60c9605969a30f99d3f6215d4bf923759b4057ba0a5375559234f17d47555a84268e340ffc9ad07e03d11f40dd1f3fb5da108d11eb7f7933b7d87f2de3
-
Filesize
15KB
MD55c6fd1c6a5e69313a853a224e18a7fac
SHA110bae352f09b214edef2dc6adcb364c45fafdbec
SHA2563aa0eb4c47ac94b911f1a440324d26eee8ddf99557a718f0905bfee3cf56255f
SHA51208c2b1150f6bf505d10085a515bbfab6c1e18663c6ef75ec988727e3d30210532d03bfbfbb048b1a843d4faa5d1060f9079e018a9e892bce03f899a5a85f6034
-
Filesize
11KB
MD56a3d5701446f6635faff87014a836eee
SHA17bbc9db1c9ce70e9fc7b7348a2c96681e5d8265b
SHA25616ba05a1fa928501ffaee2e9dce449d28e8fe538df5ec6d8d1080b610b15d466
SHA512839a1277b6dbb9f2d6e572e1b50b0ad08c93256a1367f36997db07285aa7b251346499a643a985a22d9a7618635c11964e414073aa7e1bf60d36368829de8fb3
-
Filesize
13KB
MD54ec243792d382305db59dc78b72d0a1e
SHA163b7285646c72ee640d34cdc200bfc5863db3563
SHA25656e0bdf91edb21f5f5041f052723025c059a11360bb745f965a9903de9c61756
SHA51288f648d45927db65ff8cead4bb1959b1297410bf3f5b3b2783a173d708649260a61470342694de8b93e9c1657de64db43db40ee71acc661b03786c0921d68d4b
-
Filesize
12KB
MD5a51cfb8cf618571215eeba7095733b25
SHA1db4215890757c7c105a8001b41ae19ce1a5d3558
SHA2566501894e68a3871962731282a2e70614023ec3f63f600f933ec1785400716ce1
SHA5129ae11ab21486dea1aba607a4262f62678c5b0e9f62b6a63c76cfdc7698d872d8696ffb1aaae7aa2e2cf02c1c7eaa53d0ce503432960f4be6886fae0de2659535
-
Filesize
15KB
MD549363f3cf4671baa6be1abd03033542f
SHA1e58902a82df86adf16f44ebdc558b92ad214a979
SHA256505d2bde0d4d7cd3900a9c795cb84ab9c05208d6e5132749ab7c554ccd3c0fcc
SHA51298e78a607cfbb777237dc812f468ec7a1abcba9472e20a5780dfc526f7992da1841fcd9e2f76f20fa161240007f185c7fbdc120fb4c3c1f2b90fdad5913d65dd
-
Filesize
17KB
MD5be16965acc8b0ce3a8a7c42d09329577
SHA16ac0f1e759781c7e5342b20f2a200a6aab66535e
SHA256fcd55331cc1f0ff4fb44c9590a9fb8f891b161147a6947ce48b88bf708786c21
SHA5127ba55fa204d43c15aca02031f584b3396bb175365dad88e4047b8a991f1f1ddd88d769e4d8cb93ee0ed45e060a1156e953df794f9cb8bb687c84c4a088da2edf
-
Filesize
17KB
MD53eae6d370f2623b37ec39c521d1f1461
SHA186d43e2e69b2066333e4afa28a27c7a74ff89991
SHA256ce74bdc6999d084a1b44b2ecea42dd28849b2825d7779effdc4c18360308b79b
SHA51230b2b6cf5cd1bbdf68de048e6d992133fe7ab0c847fa0d5eb8c681a9688d60794621a40178451a104036a0fff2e1bd66a18d9f96be6b28dbdc0bc1c8a535fc85
-
Filesize
11KB
MD5a0a883e26be6800508162e2a898148d9
SHA14f79892e7766cb7831211864978575598c86a11b
SHA2569753ae83536767c73e340c36c5f1610bc76a3e67e033b07503ec31431cba7b90
SHA51270904f2fd074073aebcf665178b34cf7f0f42ced7223ca296f7f202f6fa0175ace2832d9802f5bff4d67891ca09ae14fac47420d69107e72aa44b541a190f6c3
-
Filesize
27KB
MD58fa639e29c7d1e7a1bd0d493354df226
SHA13ad3203b18dec68815f084f28bb956f0e1f8b9fe
SHA2569177d32598d86cbe839d9a64e7654a76c2f33a91fb01186ecaed1f9e98292438
SHA5124d0bb6ccbc53bd4c9fca04bac51814a6064df2d954bf260ec24eadad61226fbea4ab569b0c2f9ba3c046284e12051a653be534aa6556d6849bff172e2c73f626
-
Filesize
172KB
MD5b61a9ee5a6c3c7a4d8b2944bee989250
SHA1b3268110ebe8d565847a34340987465c7394989b
SHA256c51fc91e9b7c855b691217dea5bc72fdf0c567f76deb204a80a0f7f50a885694
SHA51283224db6dbf8c7e1a2939126f3bdd8c110d9efde08e2243d22dcbed30d58c3730c319cc8424fd155728236cf0d4cf4d0f7c79e713df9eb840dad1a4013aac1bf
-
Filesize
863KB
MD58ed02a1a11cec72b6a6a4989bf03cfcc
SHA1172908ff0f8d7e1c0cbf107f7075ed1dba4b36c8
SHA2564fd02f2699c49579319079b963425991198f59cb1589b8afa8795b5d6a0e5db3
SHA512444fe62a5c324d38bdc055d298b5784c741f3ca8faaeaed591bd6dcf94205dbf28c7d7f7d3825ccb99eff04e3ffd831e3f98d9b314820841a0c0960ae6a5e416
-
Filesize
3.1MB
MD5186f049568c683c2597f94ac445d054f
SHA1b66903ea56214a05ede4f5228813028ba208041a
SHA25655d0d8353358de375f54cdc67dc1226d809f34771f4b728e2a52a9c22744312c
SHA5120b9d47c34fddbd7e2d021760ba562971948892a419151e56a5d081f0488b552577e824ce15a625247260da743937d38ccce1df3cc73489c35ecb8c5c0b97297a
-
Filesize
12KB
MD54296cf3a7180e10aaf6147f4aecd24e4
SHA1f81e09af979a1146774d554783d1a22a03a61393
SHA256147f86ff93d61fea256b3de9149e1b36b68a83762e62a3389466218e18359ffc
SHA51260357edde6572c5e796f927c3e72c31a96ff700624b7366fdda64bcf51ee00bf1e9ab477a46d8d3ba7391ba10491e69f745efec3607f8f49b6e1a3a3de7a0648
-
Filesize
11KB
MD58d097aa5bec8bdb5df8f39e0db30397c
SHA156f6da8703f8cdd4a8e4a170d1a6c0d3f2035158
SHA25642c235914844ce5d1bb64002fca34a776ae25ee658fc2b7b9da3291e5def7d4d
SHA512a891536e2a362fc73472fa7f5266ce29e8036959701bc0862f2b7ea5865dcd1505615edc8e064fb2f7aaa1b129e48422efe7b933b01faed9c2afadd8a64452dc
-
Filesize
21KB
MD5ab87bdae2f62e32a533f89cd362d081c
SHA140311859dd042a7e392877364568aad892792ba9
SHA2560439703e47c8fce1f367f9e36248a738db6abcd9f2dd199cb190d5e59ed46978
SHA512dbe0073da8979f3d32204680015b60435226840e732b5df964dbeeb7920c0bc5df92d866964f905518c97cc3539f628664503ffa64e50a2ef90c459b62555444
-
Filesize
19KB
MD5169e20a74258b182d2cdc76f1ae77fc5
SHA1fce3f718e6de505ac910cb7333a03a2c6544f654
SHA256224f526871c961615de17b5d7f7bbef2f3a799055cab2c8e3447b43c10c25372
SHA5120881c8704421a5f6e51abd22c55608dd7fb678491682ce86066e068b1973ebf11d6c2163be610a49f87e800c8563ebb41abfe36e1913d7d0b8485fd29ed81bf7
-
Filesize
13KB
MD5a440776e10098f3a8ef1c5eaca72958e
SHA17b8662714f6e44fb29a4224a038e4127964003e9
SHA25640d8bc312ac7bca072703e5f0852228cde418f89ba9ad69551aa7a80a2b30316
SHA512b043cd020d184a239510b2607c94210dc5fdc5d2a2b9285836bdce8934cc86a1cc3f47a2f520b15db84f755ac2e7c67e0247099648d292bbd5fb76f683d928df
-
Filesize
1.5MB
MD53aa620a3832249894026a7bcef141947
SHA1465efee181f8d8288c4a34b0a80e7070f3aa48f7
SHA256568e680c3ecaa84a76e111054a138d867813b9f65bbdc967c98304d6a0b4cf69
SHA512a788cdb4cdafbd7b96f5b9e88b72cb57fd18d8ab70e0e166fcdcdd553e1de559a6017535274e09e30d6183c7c9baae58d711820f927a8ed3c3811c6f994809a7
-
Filesize
1.8MB
MD5e1e23f21b223a052c39e8c67acd38105
SHA17f0e0baf554412a45fb10b04b0b159394f0cf3ab
SHA256f1261751289ad124a521bad5bcab76826f70b9d4686a48b9f5b3523415004cf1
SHA512d6191bdaecefe06589676c2fe54bbb2ed68e79b62f931fd3d2257e2fe1089c89508e6c09c88257f039c581200dc1b709bfff85e9de767ab5f7555765e2ca6958