Analysis

  • max time kernel
    144s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-01-2025 08:18

General

  • Target

    $PLUGINSDIR/pcfix-v305-en.exe

  • Size

    1.1MB

  • MD5

    4c75a3d68c97221315e7495fcc82a036

  • SHA1

    c1334ceeea56cb984d65bc45d49eef578e700efe

  • SHA256

    09efb6e313ce5cae07d7884bdfd9ad546c31e964cf53c0b5638cdfcf36f8d558

  • SHA512

    ebb756a110675aa368a03574ba44dbedadcac6bb263e8d0ba13718961f48defdda223b67e9fdcb3a0ae1c736374fccecee7766c8aa13f0e4ec4c195dd40b9b0b

  • SSDEEP

    24576:9naG0Qv7yaJUQuFxdxnwb/acJKG7Sl4g54jKa9sI2uFtbo/U:9agXJw4b/zJKTl4g57a9sCHb

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\pcfix-v305-en.exe
    "C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\pcfix-v305-en.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2560
    • C:\Users\Admin\AppData\Local\Temp\is-VER2E.tmp\pcfix-v305-en.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-VER2E.tmp\pcfix-v305-en.tmp" /SL5="$400E0,858723,80384,C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\pcfix-v305-en.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      PID:2140

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\is-VER2E.tmp\pcfix-v305-en.tmp

    Filesize

    717KB

    MD5

    bd048bd875182e696527702d2fc8cda9

    SHA1

    abc3c2d0b4cdad9daa17582d057fb93501296201

    SHA256

    48fbb6e511ae6d2c17ee781d7a6ab20585713e68ea76f5431d1abd64b0ee71b6

    SHA512

    029325fcce6b94c80a7b2baec544294ac024af2cd1bb4e1e20190a61c072ab37cc9b425b4a167e1e47486491d2b741d1e0abe2bbd4dcc8b379576cbf4a6d0164

  • \Users\Admin\AppData\Local\Temp\is-6SHKA.tmp\_isetup\_shfoldr.dll

    Filesize

    22KB

    MD5

    92dc6ef532fbb4a5c3201469a5b5eb63

    SHA1

    3e89ff837147c16b4e41c30d6c796374e0b8e62c

    SHA256

    9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

    SHA512

    9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

  • memory/2140-36-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-28-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-44-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-42-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-18-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-20-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-22-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-24-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-26-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-11-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-30-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-32-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-34-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-40-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2140-38-0x0000000000400000-0x00000000004C3000-memory.dmp

    Filesize

    780KB

  • memory/2560-0-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2560-16-0x0000000000400000-0x000000000041B000-memory.dmp

    Filesize

    108KB

  • memory/2560-3-0x0000000000401000-0x000000000040B000-memory.dmp

    Filesize

    40KB