Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2025 03:14

General

  • Target

    723-130-2025.exe

  • Size

    1.1MB

  • MD5

    1cf5ecd1b8b508ae3c6a04a3341439f3

  • SHA1

    e97b3bb75997b8faa8d54975e8dec5b3cd0f3a71

  • SHA256

    a82f8608d3e988686365f5a95c721ed3669a088b4f48181cac546e85a1c81104

  • SHA512

    e676a40018ba9e46290c6b15cbe444ec966467a531e2cc3a65939fa36d90c467f22a6baa5277443ce314e1f663d937519a26574f4920850663c67a539f4832a4

  • SSDEEP

    24576:mAHnh+eWsN3skA4RV1Hom2KXFmIaQhxZhzOq3Q5:Bh+ZkldoPK1XaQhxZtJm

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1168
    • C:\Users\Admin\AppData\Local\Temp\723-130-2025.exe
      "C:\Users\Admin\AppData\Local\Temp\723-130-2025.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\723-130-2025.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:2628
    • C:\Windows\SysWOW64\netbtugc.exe
      "C:\Windows\SysWOW64\netbtugc.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\antiprimer

    Filesize

    264KB

    MD5

    db188804ef5ffa5fafa804b555dd40b9

    SHA1

    a181d975979f35d6ca17a736d3c143a75e63e6d7

    SHA256

    0c302426b73d5cb269aad18c78dc2616f5faeb1a0b2b88b999d6cd623f8cb723

    SHA512

    d872aba3b3e78e2c6f0094d724bacee36289a27e08de596bd047f673d3cd3c429bd6001b076cf79bdd5f9174815f361b10a6ea2923ca3dfdcdb84f184eddeae8

  • C:\Users\Admin\AppData\Local\Temp\dfdx-v.zip

    Filesize

    557KB

    MD5

    d113a47c6ac162a76d78c817aeb57755

    SHA1

    f301cea25c2032dd67ffbd21242b209f0ee70ee2

    SHA256

    bae32df8fa24a3e55bcc1591e09918259173f870090e2ae775509edb8b893eb4

    SHA512

    ba64e248ee75fa43cae60c1e0815c512f89eabc140b35aa696d428a3f5d328db04981c0f500b78211bbfd9087ba678328c8ad63ac51249062900693a1d399178

  • \Users\Admin\AppData\Local\Temp\sqlite3.dll

    Filesize

    1.1MB

    MD5

    f55e5766477de5997da50f12c9c74c91

    SHA1

    4dc98900a887be95411f07b9e597c57bdc7dbab3

    SHA256

    90be88984ee60864256378c952d44b13d55ac032ab6a7b8c698885176bcece69

    SHA512

    983417a297e68b58fbd1c07fed7a1697d249110a2c10644b2dc96e3facedd3fbfbcac6a7809631ffd62894f02cadd4d3e62022b9e5e026e5bf434f1eb1878f05

  • memory/1168-19-0x0000000009B50000-0x000000000B1A1000-memory.dmp

    Filesize

    22.3MB

  • memory/1168-30-0x00000000052C0000-0x00000000053CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1168-29-0x00000000052C0000-0x00000000053CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1168-32-0x00000000052C0000-0x00000000053CA000-memory.dmp

    Filesize

    1.0MB

  • memory/1168-26-0x0000000009B50000-0x000000000B1A1000-memory.dmp

    Filesize

    22.3MB

  • memory/2032-12-0x0000000000780000-0x0000000000B80000-memory.dmp

    Filesize

    4.0MB

  • memory/2468-21-0x00000000000C0000-0x00000000000FF000-memory.dmp

    Filesize

    252KB

  • memory/2468-70-0x0000000061E00000-0x0000000061EF3000-memory.dmp

    Filesize

    972KB

  • memory/2468-31-0x0000000000410000-0x00000000004B0000-memory.dmp

    Filesize

    640KB

  • memory/2468-20-0x00000000000C0000-0x00000000000FF000-memory.dmp

    Filesize

    252KB

  • memory/2468-24-0x0000000000880000-0x0000000000B83000-memory.dmp

    Filesize

    3.0MB

  • memory/2468-25-0x00000000000C0000-0x00000000000FF000-memory.dmp

    Filesize

    252KB

  • memory/2468-28-0x00000000000C0000-0x00000000000FF000-memory.dmp

    Filesize

    252KB

  • memory/2468-27-0x0000000000410000-0x00000000004B0000-memory.dmp

    Filesize

    640KB

  • memory/2468-69-0x00000000000C0000-0x00000000000FF000-memory.dmp

    Filesize

    252KB

  • memory/2628-17-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2628-22-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2628-23-0x00000000001B0000-0x00000000001D1000-memory.dmp

    Filesize

    132KB

  • memory/2628-18-0x00000000001B0000-0x00000000001D1000-memory.dmp

    Filesize

    132KB

  • memory/2628-16-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2628-15-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB

  • memory/2628-14-0x00000000008B0000-0x0000000000BB3000-memory.dmp

    Filesize

    3.0MB

  • memory/2628-13-0x0000000000400000-0x0000000000442000-memory.dmp

    Filesize

    264KB