Analysis

  • max time kernel
    88s
  • max time network
    74s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    20-01-2025 09:15

General

  • Target

    78a74ea4f8dc7a468ba1fcfeaeef24b17eea9bbbedfe897ec7cf02c1e60c3e61.exe

  • Size

    2.0MB

  • MD5

    0ead280a3e08ff34bee62fcc9cf0a53f

  • SHA1

    8c001de69521a96da77c512fa6742bb3fefcda7d

  • SHA256

    78a74ea4f8dc7a468ba1fcfeaeef24b17eea9bbbedfe897ec7cf02c1e60c3e61

  • SHA512

    047d7d5ef85d6d4ffb1ccf53e2696153ddd6bed38484743c9c4454a0cdcd51934912ebdee2a9de390cc35f8b7db1ecfaa6a2c3d358a92d8a5aae6a63e349b45b

  • SSDEEP

    49152:N2nvdBTU7QFQP+ENo53Ip737cp3+BbQ8V+jW1aMibv:AvzWB7NYIp7349+BbB+jWIv

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 11 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78a74ea4f8dc7a468ba1fcfeaeef24b17eea9bbbedfe897ec7cf02c1e60c3e61.exe
    "C:\Users\Admin\AppData\Local\Temp\78a74ea4f8dc7a468ba1fcfeaeef24b17eea9bbbedfe897ec7cf02c1e60c3e61.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2204
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C COpY /Y "C:\Users\Admin\AppData\Local\Temp\78a74ea4f8dc7a468ba1fcfeaeef24b17eea9bbbedfe897ec7cf02c1e60c3e61.exe" ..\ZamAC7VNr~i2uF.eXe > nUL && Start ..\ZAmAC7vNr~i2uF.eXE -po0TK~LTdWE2nXBqcFAGZqLa & if "" == "" for %X In ( "C:\Users\Admin\AppData\Local\Temp\78a74ea4f8dc7a468ba1fcfeaeef24b17eea9bbbedfe897ec7cf02c1e60c3e61.exe" ) do taskkill /im "%~NXX" /F > nUL
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Users\Admin\AppData\Local\Temp\ZamAC7VNr~i2uF.eXe
        ..\ZAmAC7vNr~i2uF.eXE -po0TK~LTdWE2nXBqcFAGZqLa
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2272
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C COpY /Y "C:\Users\Admin\AppData\Local\Temp\ZamAC7VNr~i2uF.eXe" ..\ZamAC7VNr~i2uF.eXe > nUL && Start ..\ZAmAC7vNr~i2uF.eXE -po0TK~LTdWE2nXBqcFAGZqLa & if "-po0TK~LTdWE2nXBqcFAGZqLa " == "" for %X In ( "C:\Users\Admin\AppData\Local\Temp\ZamAC7VNr~i2uF.eXe" ) do taskkill /im "%~NXX" /F > nUL
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2300
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c ecHo h%Time%BmguLC:\Users\Admin\AppData\Local\TempU7k%Cd%qi%Cd%08jLy%rANDom%I79C> BSNd.E0I & ecHO | seT /p = "MZ" > YO~XCVJS.miu & cOPY /Y /b Yo~xCVJS.MiU + ldZpT.u + 2B7b.THK + O79G.NW + 7DOCE1.SU_ +BSNd.E0I ..\n~qYw._IC > nuL& DEl /Q *> NUL& StaRT regsvr32 /S ..\N~qYW._IC -u
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1748
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" ecHO "
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1976
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" seT /p = "MZ" 1>YO~XCVJS.miu"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2332
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32 /S ..\N~qYW._IC -u
            5⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2072
            • C:\Users\Admin\AppData\Local\Temp\f77f151.exe
              "C:\Users\Admin\AppData\Local\Temp\f77f151.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:2736
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 532
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:816
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im "78a74ea4f8dc7a468ba1fcfeaeef24b17eea9bbbedfe897ec7cf02c1e60c3e61.exe" /F
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2264

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\2b7b.THk

    Filesize

    393KB

    MD5

    4b9e46165a55d8876d0e85cac6282775

    SHA1

    103045f664b16fb1e51fd127dcefc6d5a5ba8e70

    SHA256

    2fe223befa1178489b046a44253c6f88c8f7b73b9374c2309377c46bf1d4a819

    SHA512

    3f495bed08516ed670b8877e497b5044a2bb379b8eacd34ce7539ca3d108b7cd348d1a6be39b4d1790b724eb3b02b90282023e6c76037701be5d0fbe6f45b869

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\YO~XCVJS.miu

    Filesize

    2B

    MD5

    ac6ad5d9b99757c3a878f2d275ace198

    SHA1

    439baa1b33514fb81632aaf44d16a9378c5664fc

    SHA256

    9b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d

    SHA512

    bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\ldZpT.u

    Filesize

    73KB

    MD5

    c0a777e2eee4a3c706a2a05f94c0a87e

    SHA1

    ad55bc9e6893b871d368b5e9f16636945e8b038d

    SHA256

    2a5511aa2c973586bdb6930a817bb94832329f7b30168388896c103f4172bfc2

    SHA512

    4e37828f444436ef161dfed5c7f858a9ea6ff23c68c27bb7c5064e4d5b31a8002dfdd1a68ac08528246c6ff869a0c4380dae22bb3d738d2e1f1391f3ec99e594

  • C:\Users\Admin\AppData\Local\Temp\RarSFX1\o79g.NW

    Filesize

    1.0MB

    MD5

    a2cc505f8d5a2efa58dad23fb5b08c9b

    SHA1

    30eb4ab5b81259eef3514f3d9c6f9a0b066e4a89

    SHA256

    4f4a847a0559960c6d29acc91fe5b1a649964d781a255670f025e32990a1ed6b

    SHA512

    b38fcadc35ba9e0b401f2b2df1077bb3b15e504b18c4a9657cbc4ca01de706f3def36659dfb03f072841d12ac522e66748ca505c961bac15bcedc7399277e527

  • \Users\Admin\AppData\Local\Temp\ZamAC7VNr~i2uF.eXe

    Filesize

    2.0MB

    MD5

    0ead280a3e08ff34bee62fcc9cf0a53f

    SHA1

    8c001de69521a96da77c512fa6742bb3fefcda7d

    SHA256

    78a74ea4f8dc7a468ba1fcfeaeef24b17eea9bbbedfe897ec7cf02c1e60c3e61

    SHA512

    047d7d5ef85d6d4ffb1ccf53e2696153ddd6bed38484743c9c4454a0cdcd51934912ebdee2a9de390cc35f8b7db1ecfaa6a2c3d358a92d8a5aae6a63e349b45b

  • \Users\Admin\AppData\Local\Temp\f77f151.exe

    Filesize

    21KB

    MD5

    858939a54a0406e5be7220b92b6eb2b3

    SHA1

    da24c0b6f723a74a8ec59e58c9c0aea3e86b7109

    SHA256

    a30f30a109cb78d5eb1969f6c13f01a1e0a5f07b7ad8b133f5d2616223c1ce0a

    SHA512

    8875d1e43ea59314695747796894a2f171e92f7b04024dbc529af1497331489e279cd06ea03061288089d2f07ad437178b9d62f0bae2e16ae0b95c5681569401

  • memory/2072-35-0x000000002DD50000-0x000000002DDE8000-memory.dmp

    Filesize

    608KB

  • memory/2072-38-0x000000002E7D0000-0x000000002E85C000-memory.dmp

    Filesize

    560KB

  • memory/2072-32-0x000000002DD50000-0x000000002DDE8000-memory.dmp

    Filesize

    608KB

  • memory/2072-33-0x0000000002570000-0x0000000003570000-memory.dmp

    Filesize

    16.0MB

  • memory/2072-28-0x000000002D010000-0x000000002D0BB000-memory.dmp

    Filesize

    684KB

  • memory/2072-36-0x000000002DDF0000-0x000000002E729000-memory.dmp

    Filesize

    9.2MB

  • memory/2072-37-0x000000002E730000-0x000000002E7C1000-memory.dmp

    Filesize

    580KB

  • memory/2072-29-0x000000002DD50000-0x000000002DDE8000-memory.dmp

    Filesize

    608KB

  • memory/2072-41-0x000000002E7D0000-0x000000002E85C000-memory.dmp

    Filesize

    560KB

  • memory/2072-42-0x0000000000110000-0x0000000000111000-memory.dmp

    Filesize

    4KB

  • memory/2072-43-0x0000000000110000-0x0000000000114000-memory.dmp

    Filesize

    16KB

  • memory/2072-44-0x0000000000120000-0x0000000000126000-memory.dmp

    Filesize

    24KB

  • memory/2072-27-0x0000000002570000-0x0000000003570000-memory.dmp

    Filesize

    16.0MB

  • memory/2736-68-0x0000000001010000-0x0000000001018000-memory.dmp

    Filesize

    32KB