Analysis

  • max time kernel
    104s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-02-2025 04:37

General

  • Target

    97a47d233eb45151f4bad8172f2c905e12a9ac7f8c5e0d2e968e584e0a5c0a1a.exe

  • Size

    576KB

  • MD5

    474cb2f66478f9fbcc9265aa1b1e688e

  • SHA1

    89c8bc9f3e577e4e2c491624c9d464a7fa17e549

  • SHA256

    97a47d233eb45151f4bad8172f2c905e12a9ac7f8c5e0d2e968e584e0a5c0a1a

  • SHA512

    311b71f672fbb2bf37a08b1b4b2da14311ce0e6a3e564d19c99ce85f8a65ab61df3307f459a34c077289bba23fdfb08e12aec06ede100a51084b2abbfff9f253

  • SSDEEP

    12288:3R+lB7X/h6XFRbf0ez0npM4dl0v5Jdm5IpXt1U:36Ph6XFRbf0ezEM4dmv5BJtO

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\97a47d233eb45151f4bad8172f2c905e12a9ac7f8c5e0d2e968e584e0a5c0a1a.exe
    "C:\Users\Admin\AppData\Local\Temp\97a47d233eb45151f4bad8172f2c905e12a9ac7f8c5e0d2e968e584e0a5c0a1a.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1552
    • C:\Users\Admin\AppData\Local\Temp\97a47d233eb45151f4bad8172f2c905e12a9ac7f8c5e0d2e968e584e0a5c0a1a.exe
      C:\Users\Admin\AppData\Local\Temp\97a47d233eb45151f4bad8172f2c905e12a9ac7f8c5e0d2e968e584e0a5c0a1a.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of UnmapMainImage
      PID:2720

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\97a47d233eb45151f4bad8172f2c905e12a9ac7f8c5e0d2e968e584e0a5c0a1a.exe

    Filesize

    576KB

    MD5

    f2e535b4fe1a411235282e2c700a92fb

    SHA1

    40d6381bdbdc9f82b190a715f5d4a29a20a0ec2a

    SHA256

    87e77439085f231d3f25b1a29fea884ff9a040b1bc6a7653df6b41e4877bd259

    SHA512

    0fb0d1f9aff87d1383f28fc87583a7392dbb7644c7bf1ef849a6c0fcb6b08c59b2c00d7610b9262b840ac60645bb1f7bc2254b4f82e11f402a55f57de9a0414f

  • memory/1552-0-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/1552-8-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2720-10-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB

  • memory/2720-11-0x0000000000310000-0x0000000000350000-memory.dmp

    Filesize

    256KB

  • memory/2720-12-0x0000000000400000-0x0000000000415000-memory.dmp

    Filesize

    84KB

  • memory/2720-17-0x0000000005E60000-0x0000000005E62000-memory.dmp

    Filesize

    8KB

  • memory/2720-19-0x0000000000400000-0x0000000000440000-memory.dmp

    Filesize

    256KB