Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2024 01:36

General

  • Target

    74eed520d759e623eda681f601b8a7ceb741088b36f0ad3442f8127a374790c2.exe

  • Size

    2.3MB

  • MD5

    349f1e2d55ec863e91cd325d6e3355ff

  • SHA1

    eaa906385fe2047e586c7d09f50c12fae72b2784

  • SHA256

    74eed520d759e623eda681f601b8a7ceb741088b36f0ad3442f8127a374790c2

  • SHA512

    a3fc8a82d964d15f98660406c4a026ab481ce1eecd4eb1f30f4380a9067615404267aee840c12d0921ac8e95b40c837a76c0a94ff317cac7a1a361ba87f20dad

  • SSDEEP

    49152:TpioFaxkpgF+x9gffTrkSbmVBBEzLHfLI0Q/l7GdkFFCfIGXL9:coFcKx9gf2VBkY7GdkbCDXZ

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74eed520d759e623eda681f601b8a7ceb741088b36f0ad3442f8127a374790c2.exe
    "C:\Users\Admin\AppData\Local\Temp\74eed520d759e623eda681f601b8a7ceb741088b36f0ad3442f8127a374790c2.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:548
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwAzAA==
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3472
    • C:\Users\Admin\AppData\Local\Temp\74eed520d759e623eda681f601b8a7ceb741088b36f0ad3442f8127a374790c2.exe
      C:\Users\Admin\AppData\Local\Temp\74eed520d759e623eda681f601b8a7ceb741088b36f0ad3442f8127a374790c2.exe
      2⤵
      • System Location Discovery: System Language Discovery
      PID:740

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/548-65-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-4-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-61-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-3-0x00000000053A0000-0x00000000055F8000-memory.dmp

    Filesize

    2.3MB

  • memory/548-5-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-7-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-13-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-63-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-9-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-11-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-15-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-19-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-0-0x00000000745DE000-0x00000000745DF000-memory.dmp

    Filesize

    4KB

  • memory/548-23-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-21-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-25-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-29-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-37-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-27-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-67-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-17-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-1-0x00000000013B0000-0x000000000160E000-memory.dmp

    Filesize

    2.4MB

  • memory/548-2-0x00000000745D0000-0x0000000074CBE000-memory.dmp

    Filesize

    6.9MB

  • memory/548-59-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-57-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-55-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-53-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-51-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-49-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-47-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-45-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-43-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-41-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-39-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-35-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-33-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-31-0x00000000053A0000-0x00000000055F2000-memory.dmp

    Filesize

    2.3MB

  • memory/548-8907-0x00000000745D0000-0x0000000074CBE000-memory.dmp

    Filesize

    6.9MB

  • memory/548-8883-0x00000000745DE000-0x00000000745DF000-memory.dmp

    Filesize

    4KB

  • memory/548-8884-0x00000000745D0000-0x0000000074CBE000-memory.dmp

    Filesize

    6.9MB

  • memory/3472-8885-0x0000000002A40000-0x0000000002A80000-memory.dmp

    Filesize

    256KB

  • memory/3472-8882-0x0000000002A40000-0x0000000002A80000-memory.dmp

    Filesize

    256KB