Analysis

  • max time kernel
    27s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:13 UTC

General

  • Target

    834458e6efa75273db3e9a2c5c4c3293.exe

  • Size

    866KB

  • MD5

    834458e6efa75273db3e9a2c5c4c3293

  • SHA1

    bb378bd95e1703b97c04e718eec1ff2450d5d05c

  • SHA256

    333538bef9583fb942047c9f004540af1f6c56b6f09083b27272459aab610b6d

  • SHA512

    6a3574a333680f62f5047f4f2acdc2d1f93cb3f30405f986748212e62e58e1b024fe96d0b44759ccc563e91e97bd6cf0cb854041ee9541c6b2249ae04430bf55

  • SSDEEP

    6144:ztT/Yq3v9Auky+4dusAIFB++velibxPyp/64wjOjn6cB3rT7/:V6u7+487IFjvelQypyfy7T7/

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\834458e6efa75273db3e9a2c5c4c3293.exe
    "C:\Users\Admin\AppData\Local\Temp\834458e6efa75273db3e9a2c5c4c3293.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Roaming\app.exe
      "C:\Users\Admin\AppData\Roaming\app.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2904
      • C:\Users\Admin\AppData\Roaming\app.exe
        "C:\Users\Admin\AppData\Roaming\app.exe"
        3⤵
          PID:2020
        • C:\Users\Admin\AppData\Roaming\My.RawFile.exe
          "C:\Users\Admin\AppData\Roaming\My.RawFile.exe"
          3⤵
            PID:2956
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe
            "C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"
            3⤵
              PID:988
            • C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe
              "C:\Windows\Microsoft.NET\Framework\v2.0.50727\aspnet_compiler.exe"
              3⤵
                PID:2920

          Network

          • flag-us
            DNS
            checkip.dyndns.org
            Remote address:
            8.8.8.8:53
            Request
            checkip.dyndns.org
            IN A
            Response
            checkip.dyndns.org
            IN CNAME
            checkip.dyndns.com
            checkip.dyndns.com
            IN A
            158.101.44.242
            checkip.dyndns.com
            IN A
            132.226.247.73
            checkip.dyndns.com
            IN A
            193.122.6.168
            checkip.dyndns.com
            IN A
            132.226.8.169
            checkip.dyndns.com
            IN A
            193.122.130.0
          • flag-us
            DNS
            checkip.dyndns.org
            Remote address:
            8.8.8.8:53
            Request
            checkip.dyndns.org
            IN A
          • flag-us
            GET
            http://checkip.dyndns.org/
            Remote address:
            158.101.44.242:80
            Request
            GET / HTTP/1.1
            Host: checkip.dyndns.org
            Connection: Keep-Alive
            Response
            HTTP/1.1 200 OK
            Date: Sat, 22 Mar 2025 06:19:06 GMT
            Content-Type: text/html
            Content-Length: 106
            Connection: keep-alive
            Cache-Control: no-cache
            Pragma: no-cache
            X-Request-ID: ce0f8ad3a9417fbad56e66f2d4b98d2c
          • flag-us
            DNS
            smtp.yandex.com
            Remote address:
            8.8.8.8:53
            Request
            smtp.yandex.com
            IN A
            Response
            smtp.yandex.com
            IN CNAME
            smtp.yandex.ru
            smtp.yandex.ru
            IN A
            77.88.21.158
          • flag-us
            DNS
            smtp.yandex.com
            Remote address:
            8.8.8.8:53
            Request
            smtp.yandex.com
            IN A
          • flag-us
            DNS
            smtp.yandex.com
            Remote address:
            8.8.8.8:53
            Request
            smtp.yandex.com
            IN A
          • flag-us
            DNS
            www.microsoft.com
            Remote address:
            8.8.8.8:53
            Request
            www.microsoft.com
            IN A
            Response
            www.microsoft.com
            IN CNAME
            www.microsoft.com-c-3.edgekey.net
            www.microsoft.com-c-3.edgekey.net
            IN CNAME
            www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
            www.microsoft.com-c-3.edgekey.net.globalredir.akadns.net
            IN CNAME
            e13678.dscb.akamaiedge.net
            e13678.dscb.akamaiedge.net
            IN A
            23.37.198.101
          • flag-us
            DNS
            www.microsoft.com
            Remote address:
            8.8.8.8:53
            Request
            www.microsoft.com
            IN A
          • flag-gb
            GET
            http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
            Remote address:
            23.37.198.101:80
            Request
            GET /pkiops/crl/MicCodSigPCA2011_2011-07-08.crl HTTP/1.1
            Connection: Keep-Alive
            Accept: */*
            If-Modified-Since: Sun, 18 Aug 2024 00:23:49 GMT
            User-Agent: Microsoft-CryptoAPI/6.1
            Host: www.microsoft.com
            Response
            HTTP/1.1 200 OK
            Content-Length: 1078
            Content-Type: application/octet-stream
            Content-MD5: HqJzZuA065RHozzmOcAUiQ==
            Last-Modified: Tue, 14 Jan 2025 20:41:31 GMT
            ETag: 0x8DD34DBD43549F4
            x-ms-request-id: a8cbf9bc-b01e-0010-4cc4-669282000000
            x-ms-version: 2009-09-19
            x-ms-lease-status: unlocked
            x-ms-blob-type: BlockBlob
            Date: Sat, 22 Mar 2025 06:19:21 GMT
            Connection: keep-alive
            TLS_version: UNKNOWN
            ms-cv: CASMicrosoftCV442c7f89.0
            ms-cv-esi: CASMicrosoftCV442c7f89.0
            X-RTag: RT
          • flag-us
            DNS
            crl.microsoft.com
            Remote address:
            8.8.8.8:53
            Request
            crl.microsoft.com
            IN A
            Response
            crl.microsoft.com
            IN CNAME
            crl.www.ms.akadns.net
            crl.www.ms.akadns.net
            IN CNAME
            a1363.dscg.akamai.net
            a1363.dscg.akamai.net
            IN A
            2.19.252.157
            a1363.dscg.akamai.net
            IN A
            2.19.252.143
          • flag-gb
            GET
            http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
            Remote address:
            2.19.252.157:80
            Request
            GET /pki/crl/products/MicRooCerAut2011_2011_03_22.crl HTTP/1.1
            Connection: Keep-Alive
            Accept: */*
            If-Modified-Since: Thu, 26 Sep 2024 02:21:11 GMT
            User-Agent: Microsoft-CryptoAPI/6.1
            Host: crl.microsoft.com
            Response
            HTTP/1.1 200 OK
            Content-Length: 825
            Content-Type: application/octet-stream
            Content-MD5: O14L1mQEVqdJ2RVebBNXJw==
            Last-Modified: Wed, 26 Feb 2025 21:48:51 GMT
            ETag: 0x8DD56AF5BD2A499
            Server: Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
            x-ms-request-id: 42091eff-701e-0052-4a9a-882b02000000
            x-ms-version: 2009-09-19
            x-ms-lease-status: unlocked
            x-ms-blob-type: BlockBlob
            Date: Sat, 22 Mar 2025 06:19:22 GMT
            Connection: keep-alive
          • 158.101.44.242:80
            http://checkip.dyndns.org/
            http
            436 B
            615 B
            8
            7

            HTTP Request

            GET http://checkip.dyndns.org/

            HTTP Response

            200
          • 77.88.21.158:587
            smtp.yandex.com
            smtp-submission
            1.8kB
            6.8kB
            25
            22
          • 23.37.198.101:80
            http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
            http
            393 B
            1.7kB
            4
            4

            HTTP Request

            GET http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl

            HTTP Response

            200
          • 2.19.252.157:80
            http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
            http
            1.1kB
            5.4kB
            9
            7

            HTTP Request

            GET http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl

            HTTP Response

            200
          • 8.8.8.8:53
            checkip.dyndns.org
            dns
            128 B
            176 B
            2
            1

            DNS Request

            checkip.dyndns.org

            DNS Request

            checkip.dyndns.org

            DNS Response

            158.101.44.242
            132.226.247.73
            193.122.6.168
            132.226.8.169
            193.122.130.0

          • 8.8.8.8:53
            smtp.yandex.com
            dns
            183 B
            105 B
            3
            1

            DNS Request

            smtp.yandex.com

            DNS Request

            smtp.yandex.com

            DNS Request

            smtp.yandex.com

            DNS Response

            77.88.21.158

          • 8.8.8.8:53
            www.microsoft.com
            dns
            126 B
            230 B
            2
            1

            DNS Request

            www.microsoft.com

            DNS Request

            www.microsoft.com

            DNS Response

            23.37.198.101

          • 8.8.8.8:53
            crl.microsoft.com
            dns
            63 B
            162 B
            1
            1

            DNS Request

            crl.microsoft.com

            DNS Response

            2.19.252.157
            2.19.252.143

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

            Filesize

            342B

            MD5

            9628a526495b4eeafb2cab84fe5e9381

            SHA1

            4bdc251dd99bed25f41e3e1e19bf3c0015d54d68

            SHA256

            f51977f867b9a3f9c686fc17cc7ec636a5a242c69b2732bc65b7d130264ba0a8

            SHA512

            67060ca97b379d7a18b5173367855ea700af733bc3d3f88ccbe4436ebf37bd07db9da2e78d7b8055692a704ed0fa37a3094a20a4cb396add9533b2496d8cee88

          • C:\Users\Admin\AppData\Local\Temp\Cab4B2.tmp

            Filesize

            70KB

            MD5

            49aebf8cbd62d92ac215b2923fb1b9f5

            SHA1

            1723be06719828dda65ad804298d0431f6aff976

            SHA256

            b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

            SHA512

            bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

          • C:\Users\Admin\AppData\Local\Temp\Tar142D.tmp

            Filesize

            181KB

            MD5

            4ea6026cf93ec6338144661bf1202cd1

            SHA1

            a1dec9044f750ad887935a01430bf49322fbdcb7

            SHA256

            8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

            SHA512

            6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

          • C:\Users\Admin\AppData\Roaming\My.RawFile.exe

            Filesize

            142KB

            MD5

            5a733ef0de5e31e2e4b4abb016c0f251

            SHA1

            28644040a6deac35c20fa931b5d003a97293363e

            SHA256

            a80c77ca694eca3f6629c54572aba811e64b61975c5db2ff38c8d662d12b1ce7

            SHA512

            9d09ac6b6a560643cac08345ab6ef8578011b11be7d4821d7aa1b3d76f2801d30cb4d206a4ff9335f0ece5cfa2ec8258754b2481102eac3da064e5005f7ffba9

          • \Users\Admin\AppData\Roaming\app.exe

            Filesize

            872KB

            MD5

            3afc372f20d2be70e6a96ea00cf97085

            SHA1

            1839ae0d50acf027acdd2da203de5b25c41dc7f3

            SHA256

            f023a8a7be61af8fc63ba2204f39cfef93381fe3ed028602a93a96466b6e5ebf

            SHA512

            1c1ad35f18380ff78fd21e458ff9b0f8d52277ec26f017992d8867906f03abd3d92e7670aed842aa3dccc0c73a4534fa41648be489e91d2acc2ad051e8839614

          • memory/988-89-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/988-90-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/2904-93-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/2904-68-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/2904-35-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/2904-46-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/2904-36-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/2904-96-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/2904-97-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/2904-45-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/2920-75-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/2920-69-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/2920-79-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/2920-80-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/2920-71-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/2920-73-0x0000000000400000-0x0000000000410000-memory.dmp

            Filesize

            64KB

          • memory/3036-0-0x00000000745D1000-0x00000000745D2000-memory.dmp

            Filesize

            4KB

          • memory/3036-14-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/3036-26-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/3036-27-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/3036-34-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/3036-13-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/3036-12-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/3036-2-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          • memory/3036-1-0x00000000745D0000-0x0000000074B7B000-memory.dmp

            Filesize

            5.7MB

          We care about your privacy.

          This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.