Analysis

  • max time kernel
    35s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    31-12-2024 12:25

General

  • Target

    ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe

  • Size

    255KB

  • MD5

    d494a9f8938f4c23ec8d83d60376011a

  • SHA1

    4e5ba0dec506040ace872a37002783c1d0b4216c

  • SHA256

    ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a

  • SHA512

    beb93e6b994429d477db26e9201fa6ee6b59f05bed7ad337dc0771731430ba9a758b410483b8a526932bca4393da0aa3068a224f50fe203dd87002010116a968

  • SSDEEP

    6144:85p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQSp:EeGUA5YZazpXUmZhdp

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe
    "C:\Users\Admin\AppData\Local\Temp\ab0dc78ac1e647773295ef4f971e3c769b26ea3ba9bb912704d10af43eb6ac5a.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2272
    • C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
      "C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
        "C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"
        3⤵
          PID:2660

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

      Filesize

      255KB

      MD5

      e43e34252b42da04759d240b65985676

      SHA1

      0ef22f36610fef21d45f90ad082379733ef05327

      SHA256

      7023f8dadfbec5317192f382f69be2bfaa4341c40b924dfe2fc234c6c3b4476f

      SHA512

      cea189eca27bbcc8608e4f43f651d193af7ebf36b5b4ab32f6ebeb3e67db0a86b5b259476191cb50e3cf4631669eaca627f7e40ea9a97ea13574e16b33f6a37f

    • memory/2272-6-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB

    • memory/2272-2-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB

    • memory/2272-3-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB

    • memory/2272-4-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB

    • memory/2272-5-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB

    • memory/2272-0-0x00000000741C1000-0x00000000741C2000-memory.dmp

      Filesize

      4KB

    • memory/2272-1-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB

    • memory/2272-15-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB

    • memory/2852-16-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB

    • memory/2852-17-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB

    • memory/2852-18-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB

    • memory/2852-19-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB

    • memory/2852-21-0x00000000741C0000-0x000000007476B000-memory.dmp

      Filesize

      5.7MB