Analysis

  • max time kernel
    241s
  • max time network
    241s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    12-02-2025 02:10

General

  • Target

    2435433.cmd

  • Size

    1.4MB

  • MD5

    9c9536010d9af231f17acc84538df07f

  • SHA1

    67f9f971395e8d8ffcd2568c5ec7b29f4f27d4cf

  • SHA256

    27eefc56a98faa80d9c9156d351a99408dd35d2e899a8a3e8b34d56e740f3334

  • SHA512

    6f89a9750fd6ca4092ae701b65abcd5ca95bf2e0c2b99403cd4d4ca99c887c3dc40bdffd90cf9c991d20a854b4db16b84e40156380b45ec1be48359f4a8389e4

  • SSDEEP

    24576:aindj4JTlehuO9XnxLD8tGAFIVodVWCFL6JCW2pDt4K:j4+Vxqqo5FGA3

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 10 IoCs
  • Command and Scripting Interpreter: JavaScript 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • NSIS installer 2 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\2435433.cmd"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2580
    • C:\Windows\system32\cscript.exe
      cscript p.js
      2⤵
        PID:1344
      • C:\Users\Admin\AppData\Local\Temp\maxthon.pif
        maxthon.pif
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: CmdExeWriteProcessMemorySpam
        • Suspicious use of WriteProcessMemory
        PID:1224
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1224 -s 528
          3⤵
          • Loads dropped DLL
          • Program crash
          PID:572

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\furriery.ini

      Filesize

      38B

      MD5

      b1ef763e50c5aabcdf24507256cdecb5

      SHA1

      544323e0812a2d71bc5e156e42bbe25f6082afab

      SHA256

      65724906ac58f577bd6b805237a1d03107bd94276121ef81e1fbfd368672abb4

      SHA512

      71c29b23cc8d2f16bb9f4667d25a7d01cf593134425359fc735c6056d154addb113dce0a9899f90d0dac4b3e46a3849fdee9190f3bf067fdba3b89f5b1170c67

    • C:\Users\Admin\AppData\Local\Temp\maxthon.pif

      Filesize

      935KB

      MD5

      b2133aba6fde5e6b68bb3f5b1ed8ed29

      SHA1

      cce05c4dfe8286601e5e36d1d2f2486758cd53d1

      SHA256

      0cd8b00f33a98cc494f251b51a95d4454f2bee979dbee98555accee3dfe37db4

      SHA512

      3c51c879a3fdeff67b2b29a08fb0c48cfd83a4331832313c75df692fd429d89e24481c67ed7829a9de3c01c3ebabcd0d42459bbd3fa5b5713545568543bd1813

    • C:\Users\Admin\AppData\Local\Temp\p.js

      Filesize

      454B

      MD5

      512de64f32a0387d27f0d77251ea264c

      SHA1

      1f394a3cff8a9c0d7b5126859ec10356b9885cc4

      SHA256

      fc89b98b929495596a34a2dff20fe6100c79b730d7e5734d0bf7f0c001a5ad7d

      SHA512

      8b9f78ad373c1e11f441ef6fa9ea1d57776e11a1c0e39bc6de92aeba95a6d0c5228942869abd3e7ff82ca66b59545a9e8c0c5f6281b79baf3dbc7cfd933cabe9

    • C:\Users\Admin\AppData\Local\Temp\x

      Filesize

      1.3MB

      MD5

      ba1ce6811dc9aaa05b7d4cdfb7ae968a

      SHA1

      29a5707e4e64373a5078d681a2298606a3114e37

      SHA256

      a37670491331e8cffeb8c3f88cf0b6a370c2194e7a7defa9edded3fa3a0ad584

      SHA512

      c1148d1f44b4a1aacfb7e742b16b6c1440953cac403dfcdb5db84506bbe739a1657017724f64d6d147c6d711ddbe1a11cdd3d89c1a1ea2b266cef644e5f534f5

    • C:\Users\Admin\AppData\Local\Temp\x

      Filesize

      640B

      MD5

      06da6961a06b978e4364b5746dfc0635

      SHA1

      4f8fc9bad998916a4c426e6ad849ff3e75ebd9e2

      SHA256

      f9349a6e0fe149d1d79cc3fdae3ba077827db710ad59804ca7804b0d3da4b980

      SHA512

      6e25331f96b242ae588a3955aab548ad694b77cf0e90e87ebb0b7b2c316bdb551ff121c9e167e0671588cadfd0e07d69dbd1b2800e3e240fd9dfe5bf97b1bc0d

    • C:\Users\Admin\AppData\Local\Temp\x

      Filesize

      4KB

      MD5

      41a97e1be224a10b5d85c299777be2f5

      SHA1

      17b3fa04e615ca25dd3df863cf6f4cd44a8e1559

      SHA256

      45f6ff5579c3f4d01e9b098f96c5cc080ce1eba19f97231f95bcf152fd097ec6

      SHA512

      e93f28c2dc56a92f06f53e6ef9851bdc901f62dec94d784e0e85f3e1d4d23c37b36cd58368d865cc1c5b92cbc6460d74923be74abdbc889929c6e1b4488e097d

    • \Users\Admin\AppData\Local\Temp\nso2EFD.tmp\LangDLL.dll

      Filesize

      5KB

      MD5

      b21a3377e66b941df6d5b7cf8ba7a43a

      SHA1

      e7ed27fce2db9cdc11ca3c640806731dcef3864a

      SHA256

      ba46a03088f690ce966043f49761ff3a3a0dca236160794de841dfecc3588d1e

      SHA512

      f011a824c0ff7f87c6da112898f4afc87e12c5b39fb40ffcc0955012e79a4302597d892224b3b47e8143480605c73275d3799d6d2000cdf179c2912241f86916

    • \Users\Admin\AppData\Local\Temp\nso2EFD.tmp\System.dll

      Filesize

      12KB

      MD5

      792b6f86e296d3904285b2bf67ccd7e0

      SHA1

      966b16f84697552747e0ddd19a4ba8ab5083af31

      SHA256

      c7a20bcaa0197aedddc8e4797bbb33fdf70d980f5e83c203d148121c2106d917

      SHA512

      97edc3410b88ca31abc0af0324258d2b59127047810947d0fb5e7e12957db34d206ffd70a0456add3a26b0546643ff0234124b08423c2c9ffe9bdec6eb210f2c