Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-01-2025 06:25

General

  • Target

    89f1d675850c32ef010fc8f96e597fbb8ed41a9b92434688ffd1fc4be8002606N.exe

  • Size

    1003KB

  • MD5

    f1f907b229714e2a51a992a98f1dcea0

  • SHA1

    9ee1c94d609ebf7657c2c53740d264a7181fa4b2

  • SHA256

    89f1d675850c32ef010fc8f96e597fbb8ed41a9b92434688ffd1fc4be8002606

  • SHA512

    59e9baabc01ea92d10c645a9bf6a4872c426ee30c11dda7626e6c70ddc0d08946e935293292c614f2c028f330a00db3af9d680c05a754dc2c35df94473e24dda

  • SSDEEP

    24576:NGd7ccE0a+UXGSafMOjDs3Cb94oKnCV8LvxXa0qOvOZth:QAcE0a7X2MOTanCV8LdrqcQh

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates processes with tasklist 1 TTPs 2 IoCs
  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\89f1d675850c32ef010fc8f96e597fbb8ed41a9b92434688ffd1fc4be8002606N.exe
        "C:\Users\Admin\AppData\Local\Temp\89f1d675850c32ef010fc8f96e597fbb8ed41a9b92434688ffd1fc4be8002606N.exe"
        2⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1868
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c move Scholar Scholar.cmd & Scholar.cmd
          3⤵
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1848
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2432
          • C:\Windows\SysWOW64\findstr.exe
            findstr /I "opssvc wrsa"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2876
          • C:\Windows\SysWOW64\tasklist.exe
            tasklist
            4⤵
            • Enumerates processes with tasklist
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2768
          • C:\Windows\SysWOW64\findstr.exe
            findstr "AvastUI AVGUI bdservicehost nsWscSvc ekrn SophosHealth"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2756
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c md 401601
            4⤵
            • System Location Discovery: System Language Discovery
            PID:3036
          • C:\Windows\SysWOW64\extrac32.exe
            extrac32 /Y /E Theme
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2632
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V "Wood" Attempts
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2636
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b 401601\Receipt.com + Advanced + Moved + Illness + Series + Bye + Thin + Realize + Asks + Optimal 401601\Receipt.com
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2676
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c copy /b ..\Realtor + ..\Buildings + ..\Transmitted + ..\Liked + ..\Hierarchy S
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2496
          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\401601\Receipt.com
            Receipt.com S
            4⤵
            • Suspicious use of NtCreateUserProcessOtherParentProcess
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of FindShellTrayWindow
            • Suspicious use of SendNotifyMessage
            • Suspicious use of WriteProcessMemory
            PID:1036
            • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\401601\RegAsm.exe
              "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\401601\RegAsm.exe"
              5⤵
                PID:2956
            • C:\Windows\SysWOW64\choice.exe
              choice /d y /t 5
              4⤵
              • System Location Discovery: System Language Discovery
              PID:1520
        • C:\Windows\SysWOW64\cmd.exe
          cmd /k echo [InternetShortcut] > "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CharonHarbor.url" & echo URL="C:\Users\Admin\AppData\Local\HarborOptimize Technologies\CharonHarbor.js" >> "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CharonHarbor.url" & exit
          2⤵
          • Drops startup file
          • System Location Discovery: System Language Discovery
          PID:2444

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\401601\Receipt.com

        Filesize

        1KB

        MD5

        c99c664a6beffcce2789131b9ec79aac

        SHA1

        512e42af27fd40ed52b1db1ce01ce3482e942ade

        SHA256

        67214d29dc48d99ecd61f85e62472dfa6038c644914e08de2b9ebca703817153

        SHA512

        8e0e6f802290b695182ecd8fd8ec4fbd599f42c6c4af2366391cecae526a48dfdeaceda2c477304f54d2e5ad1c979fcb57d61c941ffbee17be693d5e98b87d1f

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\401601\S

        Filesize

        423KB

        MD5

        5be48e8e92441f5b91ee9cb6071c20cd

        SHA1

        c0a591b3b9c36319ace6835f39cdb3e5f8a3719e

        SHA256

        bb4e46c2dca50b6f99bd317dd82cf7734fa8be28b920d3501d0163a81284c96f

        SHA512

        9af9917fb77a7fc8f81e01856dde41ed5a63c3a5b565d508c1b8f24e1866b882e4153e25578a1f795e777633c0bfc589ecdd287a31b6082c7385763584d49332

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Advanced

        Filesize

        85KB

        MD5

        b25941a469d86cdd4e056d0b65e1109c

        SHA1

        0446678c7422c809ddb809705c780704fe11350f

        SHA256

        d6674d5eb9274ac4b96b037a4684ff354e032c22a6ed4bced7185b6706fbd583

        SHA512

        d2e3a47400c8ff701bf9fb9dac8ad2e5cd90eaae433ae9c6582eb4a65745752a359fc74daa6c253ab7a7d1e38a5a894b07550b5acb8f84292ac580bbe02dbbec

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Asks

        Filesize

        130KB

        MD5

        06e09dbe4548e722f00ba8c98c47dffa

        SHA1

        229f4bb1bbe14695ffd05309a6ae149012f1974f

        SHA256

        a8f6195a28d72c061f8d477ef1828e2b3283186e5a474915dbf2c57f263289af

        SHA512

        37fa94fd8130d6606c67e7b1a1b171b81e23d2b276a97cb3d1a8915ad9d32a9bf72023aed42a2bf233870c84e377c079fd800ec52c79dad55bc4800d646e0a3a

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Attempts

        Filesize

        1KB

        MD5

        14ffceb60c312523ebfd8ad7fa71c290

        SHA1

        4bb98d0f5a89351bcd3019d6c60ce3e57a191dc7

        SHA256

        8f71b6bc52de9f3476ceca12194820a14332a7474dd492e22f89cc83aaf08421

        SHA512

        966d82a821cda260f889079bdaa460566c8bd1b514f004c7379805fda19f034be8dd4539323dd7b897d49de7f758b0c1aad0c1f35fa0f42d35f974476883d41f

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Buildings

        Filesize

        91KB

        MD5

        44c938ae9f07e37c5a6e19eba7e5ba43

        SHA1

        8bdd0cd261b8805b3c708a0b3ef61d82913ef3db

        SHA256

        eed8950361f7cc03d4f1147ea3bb5564dccbd006961cdce203f7ba24d6ce8371

        SHA512

        680db910b5abba5a6a4602ce7c608dcf567c78dec55bc6157153f3c4a3541edbeaf6464f5c01ef83b461117c113c313e37a9bdfd03f58ac47cd02117a1bf78ee

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Bye

        Filesize

        138KB

        MD5

        89c01d849f6eedafee2021fd1b7a1441

        SHA1

        d8c8000153022cc5c89e3802edd5c2a0c86d9461

        SHA256

        a5cd3faece1e43b3006bebafab60da40cad83d120e84322d6613fb5cb9bdc90d

        SHA512

        6b20f37253b4f67b3e1852fac0377f0826ff02b2344c359ae63e60a190b3716f5e4d53408418ef088af4ab6655d1d173005e5ea21c81e297ba8b1485a86cd9cc

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Hierarchy

        Filesize

        69KB

        MD5

        ec2cbf35ffb76c5647c36ff77ef7ba93

        SHA1

        c6557d687637569779188b82bcb0c6a8fc5c766b

        SHA256

        939857a1de024d859b197065919a9272d37986602956f7f15a9f7270e962553d

        SHA512

        7bef4d519858fad3e1444730c12abcc8f6cc900e7f6f864cf586928cb6947e8a8d20996caf0edd045ab1a4caf75061c217ae2462b353c5199c7515c00f97c830

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Illness

        Filesize

        81KB

        MD5

        164a34817ccc0baa7c70a88e3a05510c

        SHA1

        6130517ce8f79018214d26987c0e5731579e95cb

        SHA256

        c6eb44aab795978da405536df666dc52d11fd334f07fcafbc22a1d583d4300df

        SHA512

        c866cbb521acbabb757d2e97354a244fa246f8c172cb85d39b751c63621ac35da3ac12c5afa06a4c44ed10703c1bf11f8ed4f9fdb68cc3e6e66a29aeb96f449a

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Liked

        Filesize

        88KB

        MD5

        69d13091b17cbbd9edf1784feeeba94a

        SHA1

        c0724d2e01a2fb93fdaaf2d23e98e2c754931cde

        SHA256

        3c26761337893ac7afa544112e716ed77b14e199a6fa30cd1fe5356438189bd9

        SHA512

        19f43ca1e4406cfb0ac51573e7d4371239ca1a05fad755e505b699aa071099bee14661316014fe4a7db4dedfbc85c2da71665e21f2af8cb8d0ee08571c09cec8

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Moved

        Filesize

        67KB

        MD5

        026c3438221ff640a53b753f733b588e

        SHA1

        b5443cb5ae530ace7cba067257c3d275d9c0ae98

        SHA256

        14e6472e52e406a85900a27aaa03058360aec3d61693759e32bcdc16d68f238d

        SHA512

        2ac648e9eaafefc0e0b9374b8839a6ffc5c5bc2af5400bb08de20215286105e44decf1a7ce7a30407109d260a1f2b689b3f3a0c629a34b513a5d6c08df396c22

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Optimal

        Filesize

        73KB

        MD5

        be5d11b6d4324760cb4a619c24e87c02

        SHA1

        1791f6b79017d78453e0be92510db43dbcd77186

        SHA256

        d1cf46532e600abed3fb67b82d054aca1cebc33ccbba1e323f0ab3ccb9d7f5bd

        SHA512

        1c04efa2c396020cc1cd0e58d6d8860b36c16e52bb6b57beb54d05e3c089849eecd8eb8cbd444ca4f466bff9db06a51c34280ff5e49d3d6c6c7088f727ca622e

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Realize

        Filesize

        132KB

        MD5

        002eccef9660dd163aac23c76b90a809

        SHA1

        415621f38405f0d04ed24e04869940ee51744254

        SHA256

        59cf85f2a357b209e099b26c992d7640b94b60c51e7fe041a317eb0f4b175b0f

        SHA512

        3b29fc6920ca0d3334dccdd01ab5e49be93eacb49a27ed34df7b9999ef63214f0f2fa76dec603abd77cca403e22d86315bf323acacf5b9a2eab73c36c5d7f599

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Realtor

        Filesize

        83KB

        MD5

        067eceacb317cabc82a1d56f47f79337

        SHA1

        8f4866b4bf2445c4dbd3ec07879c06197aaba042

        SHA256

        8e3bb59385e4586eb0111d3b8a88315ef69e3d258e8e4a41c835a52e581443da

        SHA512

        c77417150053c5c3771441d966ba845d6d29c409755761fb20beb27f6f1fa9ad4157c5d89a8aaa2b79d71a20303615ef1a582c03a81a0d8fb76664ecd56e1207

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Scholar

        Filesize

        15KB

        MD5

        5f7efa194c13fc3da7fe655ecac38ad5

        SHA1

        a34b749f96e37e5cbc5e8f966fd4b0f644d3fc19

        SHA256

        3f2dcc1aabf2d27f92f38791ca10b67a52b2991eea89374abe1adac1b5f7d396

        SHA512

        a4e23a88878372e04f8f5be07687e0a4cdaf223b07b8b974767281111380a708b3cc59b09f69b20124dd48484d181ffa3656570262f18c570d23ce11b3a09f36

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Series

        Filesize

        103KB

        MD5

        ac56235dc8b4de1746e1b7d48409c4a2

        SHA1

        f494e41a8c8027f66dd1882509584112e4dfbb5a

        SHA256

        028c380e38514a4c362c8db858a2a68e26b3f0c62f358872d144e3a364c2c537

        SHA512

        deb9252f4e17a603a3cc617485abf516fa0d8a1cdfb8dce9bb1c64759e837432d42799ca7ecc5052b0a2b015adf370843b944ba5d8f37f990b32b1cdd8f3a4d2

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Theme

        Filesize

        476KB

        MD5

        e2c91cba56ab84c10c651e9a1bc850a5

        SHA1

        f5dae8c15e7fc4f8f8109eb0fa5e42a2de2ea8d1

        SHA256

        29789153d9e657fa1bf7ad72cac7567289d01c6dee77526b27b0cc0d2cf514c8

        SHA512

        7da2a656aa6ecec185d30b90a65d43d55364476aeb8a59d5e43a834bab52ceed8e303e753929ba27e0e4236332d9ce25ea8bf0c673e6e01b9090aad5d5113e48

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Thin

        Filesize

        114KB

        MD5

        e91aec58d6f3979d34be9ab25143843d

        SHA1

        51a102cfcf6d4f0392405b0d9a58350c768f1362

        SHA256

        7790c46d59309e28c2b72bdd928506e1988f2dbcfdc729e8757ea4a7d6a78594

        SHA512

        ba688c6a20b09d403435ee0b7dbf6aba336409b9c4448fcc07eebeef0f04a7a18412657aa399898fc9e97821d21c4bb1ef5885308accc9a052966d2055d3a84c

      • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Transmitted

        Filesize

        92KB

        MD5

        8184970fe2e67e292b24004da56e9509

        SHA1

        10b4ebfb4726d4cfa084fc45c2bd2d884a207cd2

        SHA256

        9839f954d9b9f44d5792b63bae0525d49b7b325fbacde18d2bb6cfbd2ca5ed14

        SHA512

        99ee3434553e4c144bfcc85b075979796409ad7154ccd233634a89f2f3865abd93fedd8d7f8d86543a9fd37f8c04818898f44433e27218a03bd3ce78eef60370

      • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\401601\Receipt.com

        Filesize

        925KB

        MD5

        62d09f076e6e0240548c2f837536a46a

        SHA1

        26bdbc63af8abae9a8fb6ec0913a307ef6614cf2

        SHA256

        1300262a9d6bb6fcbefc0d299cce194435790e70b9c7b4a651e202e90a32fd49

        SHA512

        32de0d8bb57f3d3eb01d16950b07176866c7fb2e737d9811f61f7be6606a6a38a5fc5d4d2ae54a190636409b2a7943abca292d6cefaa89df1fc474a1312c695f

      • \Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\401601\RegAsm.exe

        Filesize

        63KB

        MD5

        b58b926c3574d28d5b7fdd2ca3ec30d5

        SHA1

        d260c4ffd603a9cfc057fcb83d678b1cecdf86f9

        SHA256

        6e70b56d748c4ccab13cc8a055d3795ea0dd95fe3b70568d7d3ac0c6621140a3

        SHA512

        b13cb998822b716b695013bcd6dec62a2290567d0d1743b2d982ca084235cf69c6ea1fc91c9d4e62657c6f9e102c7c60e81296ab055ffe43b887c5f8ec8958ab