Resubmissions

17-01-2025 08:54

250117-kt5kmszjgv 10

17-01-2025 08:34

250117-kgmt3azlal 10

Analysis

  • max time kernel
    119s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    17-01-2025 08:34

General

  • Target

    ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe

  • Size

    78KB

  • MD5

    74921ae1ff9ebcf44aad3fe2ce87acca

  • SHA1

    26283b9057972692c0121590b7d3621f114a4daa

  • SHA256

    ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d

  • SHA512

    8fc866e869f5adad91fda66e4f8779eb2cd0caf52085eccc8e358b40aadb3df54913fb05d0e6506ad12d768886f92afa85224ecc78c6c33c6e792adf7f53b3c6

  • SSDEEP

    1536:Qmy58QvZv0kH9gDDtWzYCnJPeoYrGQtC67Q9/o1x0w:vy58Ql0Y9MDYrm7jQ9/rw

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe
    "C:\Users\Admin\AppData\Local\Temp\ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1596
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\y1f2th6h.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2888
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB48.tmp" "C:\Users\Admin\AppData\Local\Temp\vbcB47.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2900
    • C:\Users\Admin\AppData\Local\Temp\tmpA5D.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpA5D.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ee2aa77fd0b7b5e1d02e4dc411ecde9042237869aa8a4a77eaf3b204b22d117d.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:2820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESB48.tmp

    Filesize

    1KB

    MD5

    259a3f5c8f074a0e068e0533eeec20aa

    SHA1

    56fcbeac023cbc78ef51a7f518c29d38969b0aaf

    SHA256

    06495cdbcc20bfd21d042e9911d714e2a44452bceb01418d5cb963043ad0eda7

    SHA512

    b33fad0672d3fbb3533c5e913de7af6014b3463b098bd1bd328f0a0f41b3b60775f69099f5da5dd9c9e4b10e017faf27339b8afed9c12828eebea0b55ed64232

  • C:\Users\Admin\AppData\Local\Temp\tmpA5D.tmp.exe

    Filesize

    78KB

    MD5

    561545b1a3843e8b38de5f7cc52402ed

    SHA1

    44d67efd67525b9bd11e7decc3f16fa4b960dad0

    SHA256

    d6b6adaf946bce93a1a740e15e2fd8632b3246dc7a1c15b687a0eac180e7f300

    SHA512

    bc3496bc00e2451885f45b010928d4eda1f6a5b0b6b34d93e498e5a0113eb27fd263245df5bef7eb19f801ed64df70d309ce1b8c53becf4f3a7f31bd2d543e7a

  • C:\Users\Admin\AppData\Local\Temp\vbcB47.tmp

    Filesize

    660B

    MD5

    6f3ed39d0c9881dc0facb431f2568e41

    SHA1

    385383b226ac1677f3f48c73a769d445e3f6ac68

    SHA256

    bf73dad5717867b6a6af9136fcd01e854213c5614a648a84b2d0d673472fc233

    SHA512

    f994843dc072357de240ceadfc1d119a2d203ee25262316bb0852e020b6b95f0da9d6985d109c207168411872b782d1af04a616f496a0fef9cac1f6e5ddd743d

  • C:\Users\Admin\AppData\Local\Temp\y1f2th6h.0.vb

    Filesize

    14KB

    MD5

    d84007b044fe423e560c4fea030919c6

    SHA1

    c6f8f0f34fda4088dd822eda9ba075e7e66d8540

    SHA256

    8aa05421d4906efa585b4202e9860b7e21b29fda7615e6ffcb77c736381a8299

    SHA512

    7b4c8adbb2b13a1fd6460b6653f2f59060fc699b98d81dc338ed3733a8440a5041e17f44781644eb8a62152299e8d30eefe2fd3a0a7dd5aac0d4b759f1bc395f

  • C:\Users\Admin\AppData\Local\Temp\y1f2th6h.cmdline

    Filesize

    265B

    MD5

    7be96f46bbfebe23867e6741c2ebbb99

    SHA1

    df857e98b880774bf0a45afe4c2dc748a2a9c040

    SHA256

    cc7f126c6ed239de9cbb520d2052cc0f35ad28a8f3da79d4ead5951229670078

    SHA512

    ed6aa34cc5547ca3841df91cb1f886b0bf0f12a6f2432687fe7a48b49e45c0ed1887b2157342dccd97cf36fcaa3de2828e09c3950d49636c30d9ccf5784a124c

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    8b25b4d931908b4c77ce6c3d5b9a2910

    SHA1

    88b65fd9733484c8f8147dad9d0896918c7e37c7

    SHA256

    79c261ab6b394ee23ab0fd0af48bcd96f914c6bb88b36b6815b6bbf787ecd56e

    SHA512

    6d954066cec5eca118601f2f848f5c9deebe3761ac285c6d45041df22e4bc4e9e2fd98c1aa4fbb6b9c735151bf8d5fffa5acddf7060a4cf3cb7e09271a4a926d

  • memory/1596-0-0x0000000074CA1000-0x0000000074CA2000-memory.dmp

    Filesize

    4KB

  • memory/1596-1-0x0000000074CA0000-0x000000007524B000-memory.dmp

    Filesize

    5.7MB

  • memory/1596-2-0x0000000074CA0000-0x000000007524B000-memory.dmp

    Filesize

    5.7MB

  • memory/1596-24-0x0000000074CA0000-0x000000007524B000-memory.dmp

    Filesize

    5.7MB

  • memory/2888-8-0x0000000074CA0000-0x000000007524B000-memory.dmp

    Filesize

    5.7MB

  • memory/2888-18-0x0000000074CA0000-0x000000007524B000-memory.dmp

    Filesize

    5.7MB