Analysis

  • max time kernel
    7s
  • max time network
    25s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    31-01-2025 17:49

General

  • Target

    2024-12-25/unknown-ccfd8ab65761b50dd4d699f374d27b375442cfe75cb2c785a59b7fe8463d01b5.exe

  • Size

    2.7MB

  • MD5

    b6c0b8f301a977e10c5cae4c226291f0

  • SHA1

    471d41a7d1bc97a40307e7d77d363a73062ccb6d

  • SHA256

    ccfd8ab65761b50dd4d699f374d27b375442cfe75cb2c785a59b7fe8463d01b5

  • SHA512

    ca78ea0e477f93e438a7a37d20f2876da540ed9f1cbd51411cac5e4c1003041e53ef6c94b126af657e8d9cc34d45b4b9d17269a41d19a849d7bf103c8459272c

  • SSDEEP

    49152:vh+ZkldoPK8Ya8zPp4NE88c2TL8HoBW0VOnNfo4hDc+J+Hl1KH0PHQ2R4avMEO:42cPK82zPp4NE88c2TgHyb0NzhDcyKU7

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of FindShellTrayWindow 12 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2024-12-25\unknown-ccfd8ab65761b50dd4d699f374d27b375442cfe75cb2c785a59b7fe8463d01b5.exe
    "C:\Users\Admin\AppData\Local\Temp\2024-12-25\unknown-ccfd8ab65761b50dd4d699f374d27b375442cfe75cb2c785a59b7fe8463d01b5.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Users\Admin\AppData\Local\Temp\brywcbio.exe
      "C:\Users\Admin\AppData\Local\Temp\brywcbio.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:2764

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\903344641\path.ini

    Filesize

    189B

    MD5

    35c49b5d9a7d9cd3b5796852d152e32c

    SHA1

    6ce7c9a7f60ae3d3a8adae4da284b3037c61b332

    SHA256

    535200dd08c38e7766e24be09cf3c4d8bcecda4066ccf3efd7b30122350b0076

    SHA512

    c920ef253a58a9ef32719507cec50a5a36bac991c4f5b82860b6bc8439cbd66d2f4beed581251bf031dd3d2cda03eec8120fca72517b175e4d9da656cbfa2b5c

  • \Users\Admin\AppData\Local\Temp\brywcbio.exe

    Filesize

    2.7MB

    MD5

    a904f69cd1e5862adbfe1866a409aea6

    SHA1

    deaea3d8f3cccd786d68ffc8b07cb3967f31bd56

    SHA256

    c839c4a264534573214b65511082f59dfe10ee32c3d84cf1b597e42b6f95dc5f

    SHA512

    680cece4d8c8cabd889c924bb5c92ee207a6c087e28e9454a2a2bd6cc8bfb6f6e408155251bcd71624cf4dd5680db7ec8b5a09a36ac27a32308396a5456bd35b