Analysis

  • max time kernel
    36s
  • max time network
    67s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    24-12-2024 21:10

General

  • Target

    8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.exe

  • Size

    107.7MB

  • MD5

    e4b18058271e4c9bfc7e3759a6132437

  • SHA1

    70248c40ca94932a7f098a26ee7858bda5903d73

  • SHA256

    8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1

  • SHA512

    4bf709dc7e3e32d7a694732b60150ea97b834465a8074d6b3d4acab0633d3e6f2a96d211f04c58397032bf60e8b4e172c775c95b3afe8765f8e2f1b650c6a045

  • SSDEEP

    196608:+P3tq/qkMTe5v9OhQ4XPH7tNSdDawF4eEpUgCRNj7AJZQzJ////////////////X:+P9KcOY3vAawF4vpUgCRNPAotbcJG

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 64 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.exe
    "C:\Users\Admin\AppData\Local\Temp\8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Users\Admin\AppData\Local\Temp\is-OVN0T.tmp\8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-OVN0T.tmp\8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp" /SL5="$501AE,111934780,999424,C:\Users\Admin\AppData\Local\Temp\8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Users\Admin\AppData\Local\Temp\is-OR69U.tmp\PDFescape_Desktop_Installer.exe
        "C:\Users\Admin\AppData\Local\Temp\is-OR69U.tmp\PDFescape_Desktop_Installer.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2208
        • C:\Windows\SysWOW64\regsvr32.exe
          regsvr32.exe /s "C:\ProgramData\PDFescape Desktop\Installation\Statistics.dll"
          4⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:2568
        • C:\ProgramData\PDFescape Desktop\Installation\PDFescapeDesktopInstaller.exe
          "C:\ProgramData\PDFescape Desktop\Installation\PDFescapeDesktopInstaller.exe" /RegServer
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:2672
  • C:\Windows\SysWOW64\DllHost.exe
    C:\Windows\SysWOW64\DllHost.exe /Processid:{2BC47158-F746-4E22-B116-D481B09E9674}
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    PID:540
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2812

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\PDFescape Desktop\Installation\Statistics.dll

    Filesize

    2.1MB

    MD5

    e5a591c125fdf21381cf543ed7706c66

    SHA1

    0baad9f119616ce5d0d39d4cdc9c884c1002a24e

    SHA256

    15b8775a3bae497325056103db0b14842fa8ae5592dcaacd9cce593099f5dee6

    SHA512

    20e3e0e45db7cff82b665ef28621a1a4071aadc97ec7167a7e47cf5dc7669c709932f3a3f1c7d2cd6b0a75dd7d0b42c4fac2ceabe5b074d7a338da1f9e061c35

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    a862308e55ea2a5db4a3bc99e01da236

    SHA1

    bdb27d83b25d378a3ca07385aab628a2d55a9201

    SHA256

    364299195e4d0847deb7a2813ca7cc9bca72f5ea035e3050bdb8f8dcbd4738e7

    SHA512

    5d4e7fb40ccd53d3fe78494c56f30c0e49045d231e99920519ff68636777b7d91187ae0a54124a45d3dde79d6d9e7afa43a61e1fda60495d78debc3e3d93e168

  • C:\Users\Admin\AppData\Local\Temp\CabF0B7.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\TarF0CA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • \Users\Admin\AppData\Local\Temp\is-OR69U.tmp\PDFescape_Desktop_Installer.exe

    Filesize

    11.8MB

    MD5

    87d28b3d2df1cab3711bf8d3b5b520c2

    SHA1

    1987a4bf2a37f6538c701461357a52b0bce1b980

    SHA256

    88472e266efd1a24182cf902e34e9d6b08a7b5e301be837343ffd34fe5560977

    SHA512

    19226f61925328a990f6a8d7416d1047f395fcb9f2bbd3bc5d7af4b1d0e40b54cecd501f92ba885976ec790c1b397f21814116b8a6d6073d01a58d8d6f1a9de4

  • \Users\Admin\AppData\Local\Temp\is-OR69U.tmp\_isetup\_isdecmp.dll

    Filesize

    34KB

    MD5

    c6ae924ad02500284f7e4efa11fa7cfc

    SHA1

    2a7770b473b0a7dc9a331d017297ff5af400fed8

    SHA256

    31d04c1e4bfdfa34704c142fa98f80c0a3076e4b312d6ada57c4be9d9c7dcf26

    SHA512

    f321e4820b39d1642fc43bf1055471a323edcc0c4cbd3ddd5ad26a7b28c4fb9fc4e57c00ae7819a4f45a3e0bb9c7baa0ba19c3ceedacf38b911cdf625aa7ddae

  • \Users\Admin\AppData\Local\Temp\is-OVN0T.tmp\8a5414b7aac54f93ddaa9e57538378db7d68fd6e457770206eef46cd9371aeb1.tmp

    Filesize

    3.1MB

    MD5

    0dc8e93706ff1b10cd6d60ab0ec15d88

    SHA1

    9e9c66127ba35ca4ee66fb3fa8820a683d4c943e

    SHA256

    3b79aab07b9461a9d4f3c579555ee024888abcda4f5cc23eac5236a56bf740c7

    SHA512

    0dbbd64f27055997279e36254ba2515b3672b41ef037777fd7490c0d0fa22f791934b483d281a33e542d9f5ee48bac73f2817e1dd93b0e3484c4c5653c8dbf66

  • memory/848-2-0x0000000000401000-0x00000000004B7000-memory.dmp

    Filesize

    728KB

  • memory/848-0-0x0000000000400000-0x0000000000501000-memory.dmp

    Filesize

    1.0MB

  • memory/848-200-0x0000000000400000-0x0000000000501000-memory.dmp

    Filesize

    1.0MB

  • memory/2272-10-0x0000000000400000-0x0000000000723000-memory.dmp

    Filesize

    3.1MB

  • memory/2272-198-0x0000000000400000-0x0000000000723000-memory.dmp

    Filesize

    3.1MB