Resubmissions

02-01-2025 21:33

250102-1ejbvswpcv 10

08-12-2024 01:12

241208-bkq68azkep 10

Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    02-01-2025 21:33

General

  • Target

    cn1.exe

  • Size

    196KB

  • MD5

    0731b597e61c2fd74577239fc53c794b

  • SHA1

    85bf7df302e1e4e096ad8d385cac2ef004457ba9

  • SHA256

    fe23577d1480bedcd63037921bbd5a55e86171c1a7dc97667df6a674ca0044fc

  • SHA512

    6bf34bd045020a852dc2553869f67c30d13857c9fb228ae966fd2f794f607f7157933a4772c9e13e19c85bfec1f585d6e350cbcafb58c624f0aade78085664f4

  • SSDEEP

    3072:zwSn0zvOvtYzwnqSioDXx4uE9w2qbMUeZPorQ/4/464Is9Um:U00zvOvtgSiod4uYzqAvZ1/w46Iym

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cn1.exe
    "C:\Users\Admin\AppData\Local\Temp\cn1.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2028
    • \??\c:\users\admin\appdata\local\ggjtrcrbpq
      "C:\Users\Admin\AppData\Local\Temp\cn1.exe" a -sc:\users\admin\appdata\local\temp\cn1.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:796
  • C:\Windows\SysWOW64\svchost.exe
    C:\Windows\SysWOW64\svchost.exe -k ???s????h
    1⤵
      PID:2140

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\ggjtrcrbpq

      Filesize

      20.0MB

      MD5

      bb447a75129234aa4d8f88e31560d6da

      SHA1

      982f5c7ee96683153de337e5468adc553cf2d4da

      SHA256

      4267fa270c976f641c266a86d6bfb4de7f2f0713633d4f1cdbedf963f1241734

      SHA512

      1da4bec4613262b734a50d783f809dae2e350c743af860dabafa2685f407c5f63ecd71b8df5e7490022d9cbba6aea38a3f5e1c643ce5c4f9a1da3d65da9b0a7b