Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27-01-2025 08:23

General

  • Target

    58a80eca0bf2a952d1538709e9f3bef8b23394ff9ded7658b8c46836abc9a2c4N.exe

  • Size

    280KB

  • MD5

    3f746c80c54dec8c40d057087a0fe2a0

  • SHA1

    4e61dffa776f2b4cb5d6607fa3afecd899773aba

  • SHA256

    58a80eca0bf2a952d1538709e9f3bef8b23394ff9ded7658b8c46836abc9a2c4

  • SHA512

    c28a0d68bde385af9f89c11270d8e086b4915b900068bc7a2f056e84df21e4cad3b59552371b99baaa54b63e62d105b02bea0c38d29c072c9f1b4cbb1250ab66

  • SSDEEP

    6144:boy5p178U0MURaGyNXYWQzHazRfXrwSRnWwhrQ66ff:boSeGUA5YZazpXUmZhZ63

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58a80eca0bf2a952d1538709e9f3bef8b23394ff9ded7658b8c46836abc9a2c4N.exe
    "C:\Users\Admin\AppData\Local\Temp\58a80eca0bf2a952d1538709e9f3bef8b23394ff9ded7658b8c46836abc9a2c4N.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2656
    • C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
      "C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe
        "C:\Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe"
        3⤵
          PID:1748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Roaming\b1b2dqljdx3\a1punf5t2of.exe

      Filesize

      280KB

      MD5

      ae5608c9ddc01edcdff3d24a88969530

      SHA1

      c84c225b966e195cae89f24642088d724a58aec5

      SHA256

      045ecc4b0ff5f8e4f86a862a352ff3a268b29cbe04dd4ce13268f1fe45f2eaef

      SHA512

      8bce796efb50778ed59e1cc76fdea507870c23fa363d2762ce6f2e77e78b429a8c958b0e4a6270bc7ed2419c538ae8c556de4a62b569fea1eea8494ee106e8d8

    • memory/2656-3-0x0000000074970000-0x0000000074F1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2656-2-0x0000000074970000-0x0000000074F1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2656-0-0x0000000074971000-0x0000000074972000-memory.dmp

      Filesize

      4KB

    • memory/2656-4-0x0000000074970000-0x0000000074F1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2656-5-0x0000000074970000-0x0000000074F1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2656-1-0x0000000074970000-0x0000000074F1B000-memory.dmp

      Filesize

      5.7MB

    • memory/2656-14-0x0000000074970000-0x0000000074F1B000-memory.dmp

      Filesize

      5.7MB

    • memory/3016-15-0x0000000074970000-0x0000000074F1B000-memory.dmp

      Filesize

      5.7MB

    • memory/3016-16-0x0000000074970000-0x0000000074F1B000-memory.dmp

      Filesize

      5.7MB

    • memory/3016-17-0x0000000074970000-0x0000000074F1B000-memory.dmp

      Filesize

      5.7MB

    • memory/3016-18-0x0000000074970000-0x0000000074F1B000-memory.dmp

      Filesize

      5.7MB

    • memory/3016-19-0x0000000074970000-0x0000000074F1B000-memory.dmp

      Filesize

      5.7MB

    • memory/3016-21-0x0000000074970000-0x0000000074F1B000-memory.dmp

      Filesize

      5.7MB