Analysis

  • max time kernel
    120s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2025 21:06

General

  • Target

    8d31eb458dbdd8c2a077e0f460af302e23d3101ef2b3244122bbd9f27a9cfdd8N.exe

  • Size

    1.3MB

  • MD5

    ad1762e0e5eef2a9e8c2e4b2e16642c0

  • SHA1

    35db306e48aa98e9186ce3205375bd9a09994636

  • SHA256

    8d31eb458dbdd8c2a077e0f460af302e23d3101ef2b3244122bbd9f27a9cfdd8

  • SHA512

    e98e3b50b2c3ed954bb180202690c3c6faea329ae6dd55b1612f5e02afb11fcc745c58307b25116de0070696efec1bc29fa3c8e9c574cbf57c0d74b09c7f3da5

  • SSDEEP

    24576:SXgzXWjsCGT27mq5qUSXvpVWK5OjKxAVMDJdNnb4INYKk:5Xos3qQUivHW8OjWA+DJdNnccYT

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1336
      • C:\Users\Admin\AppData\Local\Temp\8d31eb458dbdd8c2a077e0f460af302e23d3101ef2b3244122bbd9f27a9cfdd8N.exe
        "C:\Users\Admin\AppData\Local\Temp\8d31eb458dbdd8c2a077e0f460af302e23d3101ef2b3244122bbd9f27a9cfdd8N.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2076
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c move Readily Readily.cmd & Readily.cmd
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2472
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2184
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "opssvc wrsa"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2908
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2976
          • C:\Windows\SysWOW64\findstr.exe
            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2784
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 373206
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2896
          • C:\Windows\SysWOW64\extrac32.exe
            extrac32 /Y /E Perspective
            4⤵
            • System Location Discovery: System Language Discovery
            PID:1684
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "Net" Miniature
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2900
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b 373206\Eur.com + Lb + Minerals + Dare + Recognized + Producing + Express + Louisiana + Wired 373206\Eur.com
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2612
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Limitations + ..\Budapest + ..\Talking + ..\Gamespot + ..\Productive + ..\Gospel w
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2304
          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\373206\Eur.com
            Eur.com w
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:2200
            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\373206\RegAsm.exe
              "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\373206\RegAsm.exe"
              5⤵
                PID:1264
            • C:\Windows\SysWOW64\choice.exe
              choice /d y /t 5
              4⤵
              • System Location Discovery: System Language Discovery
              PID:776
        • C:\Windows\SysWOW64\cmd.exe
          cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OpsGuardianX.url" & echo URL="C:\Users\Admin\AppData\Local\GuardianOps Technologies Inc\OpsGuardianX.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\OpsGuardianX.url" & exit
          2⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:2828

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\373206\Eur.com

        Filesize

        1KB

        MD5

        ff76443c2aeda3ca8d85988d9a009518

        SHA1

        011c62b7ca27444a466c5d4b4fd69089ee06b2d2

        SHA256

        7c37bc10e94f3d183c07ee8dda2e8a3b9f76483eeb852f8b1f6de598777f0469

        SHA512

        d5590772af6ad132b65e226493ee41e0903846b8f328d7cfb7e403bdc376b724f82e5e2cf7dd86f51e3881f72bf9d3ac3da9ba9ea1d97152b2bb0cc2d2dec95a

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\373206\w

        Filesize

        423KB

        MD5

        5d00fe034f1d20724db9be1d17aa03c1

        SHA1

        ee9f4aa4cff2513c6ee4fc3e11fce595e1f9d454

        SHA256

        3276c42344cfd4415777bda051269e56aa7db166c2cb6c5f47a851abf7588ee8

        SHA512

        bb272b50686f61fe067c62650ecd81364051be7b4e29d727405e51e69eec183be446cffdc28fff23449d5884a3681e99a149b731dcfbedff4c049192e75f5543

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Budapest

        Filesize

        66KB

        MD5

        ced539b5d159effcbd06594e02518d06

        SHA1

        7c23f781a6c40fd9cfb3bea502608fdb4e3f53fa

        SHA256

        ae2bb8c64e9d46952249939cc3c5e5ad6611ab50a0640127bd3c297516332079

        SHA512

        3f942945d6c797e4a39ae8f90ffc9630031dd52e7cbee64a03419a2f3763a43adad14aa0118ccd0175c94c0e00daf4e784899bb1c98061491f5691bc846a17d8

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Dare

        Filesize

        143KB

        MD5

        c45e72cc700d42dc56f6ab070d70774e

        SHA1

        42dc09f7e23e76a89413d85c3e317c1182c7b423

        SHA256

        2802a93803fafff0fd52494db12818412009df41d9673d53093423af2b4fa04c

        SHA512

        5dcc835ab2438eda0babab126dc562947cb11e1d789bf4cdabec47e9df6cf0d4e6c81a2d5a4cc48c2bf333e7230a925e36038166e9c1db09af39a3e49871b12d

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Express

        Filesize

        83KB

        MD5

        23e0b81360919f96f0b79560e6839d4b

        SHA1

        b9e911c7fb6a7645958c1b99a103f34cb407f560

        SHA256

        80ae836e47b03da345b5b7f17da6be1bfaa712f0a21456fc8eca67036a284741

        SHA512

        8c73bb76303fcf8715baeb0751235dd93cdd050e8f48381ca09974a8871e91a544ebba9fabbe719a3aa5980b66e943f094614fea67fcf4fe263d1ecb3bdab210

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Gamespot

        Filesize

        75KB

        MD5

        55a8351867e40b70f0e93261c9c6f9c0

        SHA1

        a4182d4a59bec33c99757a3a08202adb1de40490

        SHA256

        c29aadc75daa6f34d51a735b9d64e995e70a2c8a5538e83126d7e00284f5a472

        SHA512

        99831e184dac9595969b1c9d3bfdb8325cee82b56bfad60511bd06a58cab8029c43dbd20a78cc3fbb0c65d2a936ee2c83f75a3f4d8cfac680445ff6730603030

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Gospel

        Filesize

        59KB

        MD5

        16ef70a9dc9856f4ba17ef26535e99d3

        SHA1

        a1db22ceac2a02124c700221024ae832db31c0b8

        SHA256

        d0ce685b1df0a78edd487375ce625f61144e931e207ac94f747ef1c800984917

        SHA512

        d6ffe3c4abe8def4284f972484e735bfd96a983da5143c67eeb1571f578f6e8f982de285a88f7c70b83a048dbeb437e151e41c32e6c398204fdf8d09c4066b53

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Lb

        Filesize

        141KB

        MD5

        a3b4597c5c55b6e1385349daa4a36599

        SHA1

        df248e9ef380fee917214e2d042a8088092833f0

        SHA256

        89ec3ac2006b5a8213c35f055da8e3fe74325dc40724c8bf760cc3431be98776

        SHA512

        a794b897d0f08600207277753a5886ef2418e23e7ceae4392f99a652a6fb64ee3f5d35750d230878153856c46cfd1d6f76f6ba1f3486c5dd932e3257f2ff05ee

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Limitations

        Filesize

        98KB

        MD5

        71bc102ab0497efd0c8831c29e71f60d

        SHA1

        c8061fc9320565ad335542c63ace6a9d06f198ea

        SHA256

        2c65d867a0b6982960f8107c74ceea8a1c110388089a1a1bd70d767a5f44777f

        SHA512

        7870dcf9259c169fc8ea608abf065ff165e25ff18ed23a61f9122672d76cc1b74fe6cb0cfeec11a7ea304aa6d5049feeabd2c80c9f4e6cfcb283c352dc836634

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Louisiana

        Filesize

        128KB

        MD5

        56c1ed5fa8c683187c8844c5cc2dcee1

        SHA1

        aed3608dd3a369e2b9943b7b01b13dd711e4ddf7

        SHA256

        0c2f2ae052218c8f9463e53bd1295c6020b4adecfdb932d0de5351fe4fdaa1b6

        SHA512

        f4986569e0574bd2a5ef0a84bd36af747fd240971a5840116e1dbf0a6aadd50a6da797e7ab6ebb8ca2364125d6847e04c871c85e17a3db2c609618f31ddff5af

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Minerals

        Filesize

        91KB

        MD5

        e1ef25ebac937af7ba012587be46efea

        SHA1

        f95b516be9fce0497f9728f2c79af5cffae5eebe

        SHA256

        b88fd2432f8ff2cc72a46299f68ac18219a65bd694790d5d5d75ee47e9ba8191

        SHA512

        2d931cf80b5393246d56e5a0031b96503a49299bf35ca1373e58f6dfd1325a2c99d5edfcc100ecc3d4a5bd79f652d9638675cbfdb113e53fb7dcbc7bf6027cbb

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Miniature

        Filesize

        1KB

        MD5

        17c6c15706523f4e779d6c1fc48486a0

        SHA1

        96a91953b0baf77663ef61f3dcac2b0d6de2194b

        SHA256

        15fabe555e510a5206ae425ec79565cfa6ce05e746ff66c1b95e526e308916a1

        SHA512

        4eab7421605a4a189080b04d4c705425d1c657d341afc40bde16f3aa0c01db773202e1290e73f6231de2b7a78db1287071ccb4f60bbcb830873eb0a2b4d059b9

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Perspective

        Filesize

        476KB

        MD5

        390e6633ae0d3077dc258e46ec3eff33

        SHA1

        ec0b8f4fc02174449762f11801fece2367a938b4

        SHA256

        0da62115eccae4e8b5572d16ad4e87a7bddc29769ddeaa939a22cebe0a6c8576

        SHA512

        b6b5f184553e3cefe22b0368d53ac82a6c78dda33d800a832fcf9b25e973e52394b4b14deae84a6240cf1bd615f4bed1b699c84531e8dac95c7cf281cb21fd39

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Producing

        Filesize

        83KB

        MD5

        cba453b0580d620f305af0e52f84e1eb

        SHA1

        70b4ee3471f76c6dc9ff61724cd6483cedeaf221

        SHA256

        0845fa6038661f1f2fc27e646e44aa95e1aa2abe000f6874df4f5cbe0b319135

        SHA512

        1e717117885eb3b2814692e3ad90754ef2c2cef1b97c029e739011bb62498a85dff7fdd1a369b1c975f8990284c4adc7e1e2127147250c5000093d437997d8d5

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Productive

        Filesize

        68KB

        MD5

        a9fd716a0445c9ab3cb7f1690429b47f

        SHA1

        4b04cf3c9de24ddb43285af0e6a620d1dc33ede0

        SHA256

        c715eb54dcb377bf7b35af22ac03247767f26a9ce5f9f0635574f5430e11080d

        SHA512

        74e1bf3704dfef24fa2d53ab89650cbf02603ba91d14dbac727c0bde7381915a285150f072cbff735edb83d2607345b9418746a623a252c7dff0ab537a3dab37

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Readily

        Filesize

        20KB

        MD5

        b12936c12904c996e8c11786bea0f90c

        SHA1

        4c89abd80b4f7a53539ca5713dda90629b8aa494

        SHA256

        25081491a9b8c484e21f317e20db51fe99be4b812b73679688db4559e2e2150c

        SHA512

        da1935ade179346a18f890edc641c6efd1a7ae2e2cd64693a0b3723ea4edd3a937c113f0bf65e28cb10762a502b28fea1914e8b874bbc9b5e3752c8768309a2c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Recognized

        Filesize

        122KB

        MD5

        969ac2e50429e3ae3859539bddec755c

        SHA1

        5da76d9c785b1c8a91f2fa2246dc1e8e25ec6365

        SHA256

        7aacfd4cd57537a68e1e093e58d1096214ca85d6d10b0b898272802034957c72

        SHA512

        4c72147f1cc245f6ae8ec8c66cbe0009460d9078c43116826f61f13d5c1f76b803d246c65da57c256fe654fc750fa9b5c731994d3219f2d7657793d95ba94ca2

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Talking

        Filesize

        57KB

        MD5

        9f0785cd33db7c468459a1cc0705fbf9

        SHA1

        93a7e4ab34aae1f9c61eea568f916b1776918ce4

        SHA256

        c774647a6c92e69a2c95ad18764b06c8a18439822c41bf334eff21c74d930b90

        SHA512

        4d7237da2d2aaa7d650a4d879da37c31b321cf33d1d70fd550c52816f81e838a9be2f21618b414b737c06fbe145193169c2a87253adb66290e729ead452dc966

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Wired

        Filesize

        132KB

        MD5

        43f944bd616681cb6887bd821ccb88fa

        SHA1

        e675020a43a94246da28010a195113d4461bb5b3

        SHA256

        b3df7544a245eb716582047dbe1b7652b9bc611dcb18f443d74cbb811d92d564

        SHA512

        1d7718d9cc4925f3cd84406ce9b1ed7fa95835406099d407533d83cc7f0f01febb2d6451f9724db24569f8fb73fa07313c79dcf0081f9f939393edc760d45f86

      • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\373206\Eur.com

        Filesize

        925KB

        MD5

        62d09f076e6e0240548c2f837536a46a

        SHA1

        26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

        SHA256

        1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

        SHA512

        32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

      • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\373206\RegAsm.exe

        Filesize

        63KB

        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab