Analysis

  • max time kernel
    47s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:09

General

  • Target

    332a07ad965316c83984ac70dfcf9e0fea793b235afe69e8054b2bc6501827b5.exe

  • Size

    484KB

  • MD5

    a343fed4bd504af60503fbd80efa5326

  • SHA1

    239da9a238861c2e9fcd0cfc534259116f283eeb

  • SHA256

    332a07ad965316c83984ac70dfcf9e0fea793b235afe69e8054b2bc6501827b5

  • SHA512

    d62b44e5c9637f10a7b0c54db4f389a16888a5132673375daf5cf0ad2fe2302adb17a3630599dc512a4aa18fceb8f47b7324a7c6c66c6823446894b642181b19

  • SSDEEP

    1536:N4eK+IFjWfoPbuaTRM3nFkwHbaA3LL0idWwiQcmWkF7jV:G+IF6foPCaTRMXbaev0FQcmWkRV

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\332a07ad965316c83984ac70dfcf9e0fea793b235afe69e8054b2bc6501827b5.exe
    "C:\Users\Admin\AppData\Local\Temp\332a07ad965316c83984ac70dfcf9e0fea793b235afe69e8054b2bc6501827b5.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2256
    • C:\Users\Admin\AppData\Local\Microsoft\audiohd.exe
      "C:\Users\Admin\AppData\Local\Microsoft\audiohd.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2176
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -Path "C:\Users\Admin\AppData\Local\Microsoft\local.cs"; [LocalServ]::Listen()
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1272
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\mosdwkes.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCACF.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCACE.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2808

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\audiohd.exe

    Filesize

    486KB

    MD5

    e104f761903ca184f839044dea5f1cd9

    SHA1

    b284d762e8b307c993f5c965942b2ee882305afc

    SHA256

    32ea6fc0103e3b0ce5e5ea0902eff9d4d6c88578ea3dc46958faae3c675f3e6c

    SHA512

    35b8d40da2abe027ff5e3839aaf4cf5f04d8f7f58c61eed38e057dbe883aa009a3907f0d95ac41e4627f0fc43c6b15f8e293f60de83455274ad275d92645f9f8

  • C:\Users\Admin\AppData\Local\Microsoft\local.cs

    Filesize

    4KB

    MD5

    ff169c4274b91df68a1a0548b9186b29

    SHA1

    e2a406a1a49c5825d4f4279e82d1ca369433b244

    SHA256

    6da3e26b268e4a6c21e192c8b9a1b89aef6880bad673b79e6a889d29641ac2cc

    SHA512

    8785d91046722c0e8278fb95404ae284c3cf5e96060d06a7dc2209866b96618978e41844759da30fec7bdcef677fada61d3db498adbe989eaa87fbf84fc3366b

  • C:\Users\Admin\AppData\Local\Temp\RESCACF.tmp

    Filesize

    1KB

    MD5

    6c1cbb05a9b9b4cf69a5195ec3d44255

    SHA1

    97fc857ef2184aa502b66423c7dc204943deca18

    SHA256

    c8e3d2da3a94386450f05b1959c7edd9180d5eb80c84ebee7701aec2e8ac2b0f

    SHA512

    eca38622e1eac566731498a6ae74d7dc90b1a42a19d893cf83a58b4ed62ad613f84c8dec3f3420f58f9e238d00cb509907d1fd9ec5e48ac91b9d39229abd933b

  • C:\Users\Admin\AppData\Local\Temp\mosdwkes.dll

    Filesize

    6KB

    MD5

    9b8e6ebfd365598a31b8f93f98f33706

    SHA1

    1e736d0d96a4312a811dc037831985ea05c51ce3

    SHA256

    274f4a229b6c5b954b26ab9987e49112873d4a8f5a157870812c52bbeae1fe01

    SHA512

    da05b93d4e5e4437778a3ab33ea79ab770069d8e2064cccb1a955ed64e9fecdc817232915b0696437cedceaad14914760435062bbacfb8508209b5817058147f

  • C:\Users\Admin\AppData\Local\Temp\mosdwkes.pdb

    Filesize

    13KB

    MD5

    79f4ca9205ccab99b0459979a3d74111

    SHA1

    854728fe836a57cd6b9af44e948a0d8f6dd1efad

    SHA256

    efc964f93bf45af39b281b952fecd13a5987ddfc080c983a01406443d76506d5

    SHA512

    d2f2955c40005a3599eaabdca157deb9d2cd29adad14f29f6a0eaf000ef45546fba84a32b06b616cdfec924cc7931b05ed47b74f0bba3294336889791c08aaed

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCCACE.tmp

    Filesize

    652B

    MD5

    c6bd9372557276b3c3144d151b49e931

    SHA1

    43b455b3439c71caa2e24be03a0d6e4a2535ef91

    SHA256

    a3b580920188eda710026776c204f7863e752abb54991aed00aec07355f62b04

    SHA512

    d54a369205b868f12d58102278d36a0f145969c7e22aa3893a29080aeed28eebdccbe6f968574f4ee541bd6cf3e41d2786754e367ce0759539e766ed257771fe

  • \??\c:\Users\Admin\AppData\Local\Temp\mosdwkes.cmdline

    Filesize

    309B

    MD5

    0815e3da55f6117e7b2c7f9ed8baf7c2

    SHA1

    d847e59f081ec7f83cda70b031757e4a6d83cb0a

    SHA256

    a64183ae7f2b7d2b45c253b0b7ea1d92d3b7c2f52ac3f1589123e6cb96957d3f

    SHA512

    44a9e97ec6723bf53eadbe4dd7b9900109300461821df4acd82aa1129304399239383fd9b29c9b185ef1802683b880945c89987c6404e6c653fb76a22f840fcc

  • memory/2176-12-0x0000000000C40000-0x0000000000C56000-memory.dmp

    Filesize

    88KB

  • memory/2176-13-0x0000000074B40000-0x000000007522E000-memory.dmp

    Filesize

    6.9MB

  • memory/2176-14-0x0000000074B40000-0x000000007522E000-memory.dmp

    Filesize

    6.9MB

  • memory/2176-32-0x0000000074B40000-0x000000007522E000-memory.dmp

    Filesize

    6.9MB

  • memory/2176-33-0x0000000074B40000-0x000000007522E000-memory.dmp

    Filesize

    6.9MB

  • memory/2256-1-0x0000000000EE0000-0x0000000000EF6000-memory.dmp

    Filesize

    88KB

  • memory/2256-0-0x0000000074B4E000-0x0000000074B4F000-memory.dmp

    Filesize

    4KB