Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:06

General

  • Target

    d33789912af6003ecc2bc410d3ea5fd480cf5770b793cad3cad818457cd848a5N.exe

  • Size

    121KB

  • MD5

    ab922c80d97a1cb8a7240ab04c29a6f0

  • SHA1

    af5942fc219edcdce2308a58eb7cfbfdaf85fd1f

  • SHA256

    d33789912af6003ecc2bc410d3ea5fd480cf5770b793cad3cad818457cd848a5

  • SHA512

    729e5c3b474d55c2c802df0523cf0783402aaf7841c4fc0618fdc8787b21039ce2dc3821c53db4413633b5dade0d93afae4fb7d9cf38b3d79ebfc8938f8eb7d7

  • SSDEEP

    3072:927TcKFuQxqTvCIDw0x+G3dF/Ytq7xIpNelNN:KcIuamrL/v7xIpNiNN

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d33789912af6003ecc2bc410d3ea5fd480cf5770b793cad3cad818457cd848a5N.exe
    "C:\Users\Admin\AppData\Local\Temp\d33789912af6003ecc2bc410d3ea5fd480cf5770b793cad3cad818457cd848a5N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Windows\SysWOW64\svchost.exe
      C:\ProgramData\51ed14cb.exe
      2⤵
      • Adds Run key to start application
      • Checks for any installed AV software in registry
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2852
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\qcm3D07.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\d33789912af6003ecc2bc410d3ea5fd480cf5770b793cad3cad818457cd848a5N.exe""
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2536

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\qcm3D07.tmp.bat

    Filesize

    37B

    MD5

    76e0ebb1614e6089a0fd2c436edf0f31

    SHA1

    0230b37dc8efa829852d170a87bb2719db6d219c

    SHA256

    f15118ae9c9a13a7ff555103faab00a67ebe68691b31add3ca89589cd2e43b39

    SHA512

    749ca8c72eb3ec74d84586aa37e44309ddd9f8eeace0d8e4caa6ac2890a8690c82651ae7efd2b3347a26c49612ad3fc21243b40820e77c43b5314b23ba75730c

  • memory/2852-293-0x00000000000F0000-0x0000000000121000-memory.dmp

    Filesize

    196KB

  • memory/2852-117-0x00000000000F0000-0x0000000000121000-memory.dmp

    Filesize

    196KB

  • memory/2852-288-0x00000000000F0000-0x0000000000121000-memory.dmp

    Filesize

    196KB

  • memory/2852-290-0x0000000000590000-0x0000000000690000-memory.dmp

    Filesize

    1024KB

  • memory/2852-291-0x00000000000F0000-0x0000000000121000-memory.dmp

    Filesize

    196KB

  • memory/2852-2-0x00000000000F0000-0x0000000000121000-memory.dmp

    Filesize

    196KB

  • memory/2852-297-0x00000000000F0000-0x0000000000121000-memory.dmp

    Filesize

    196KB

  • memory/2852-299-0x00000000000F0000-0x0000000000121000-memory.dmp

    Filesize

    196KB

  • memory/2852-303-0x00000000000F0000-0x0000000000121000-memory.dmp

    Filesize

    196KB

  • memory/2852-304-0x00000000000F0000-0x0000000000121000-memory.dmp

    Filesize

    196KB

  • memory/2852-308-0x00000000000F0000-0x0000000000121000-memory.dmp

    Filesize

    196KB

  • memory/2852-310-0x0000000000590000-0x0000000000690000-memory.dmp

    Filesize

    1024KB