Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:15

General

  • Target

    b274fcd0b7cf29d6ccc27de01ba359bb.exe

  • Size

    12KB

  • MD5

    b274fcd0b7cf29d6ccc27de01ba359bb

  • SHA1

    64cba723549eeada97dd8a8a06da30de49b58924

  • SHA256

    8d2dfc74cf07e6eefe91c734574c11d8f967d50a3ef0c9224db27a1aeaf5fd6b

  • SHA512

    8ede2502d657bb9c7f8ef26a17a853c4c697ff4a55c02fe4828c7eb7789e53466f894ed76f3a23312b6cbbe62d33638be4f353d5bdbecfc14d7b735e5c1e321e

  • SSDEEP

    384:xL7li/2z2q2DcEQvdfcJKLTp/NK9xacZ:xWMZQ9ccZ

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b274fcd0b7cf29d6ccc27de01ba359bb.exe
    "C:\Users\Admin\AppData\Local\Temp\b274fcd0b7cf29d6ccc27de01ba359bb.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\dukhj0xi\dukhj0xi.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES69BB.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc9C2F1C51378476491B9FE45C29F8BC.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2628
    • C:\Users\Admin\AppData\Local\Temp\tmp67F8.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp67F8.tmp.exe" C:\Users\Admin\AppData\Local\Temp\b274fcd0b7cf29d6ccc27de01ba359bb.exe
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2828

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RE.resources

    Filesize

    2KB

    MD5

    4b215f4feba3705e9405697ca014baef

    SHA1

    8f0cc10ae1d95eab867a75d2b56d9b30d0137d8f

    SHA256

    26833e90459c4580b15d84df1224b34d779abcde045f1fd6c14382879111070e

    SHA512

    bf5928475db9cf3f16c93c6891e01d7074a170ef7e48cf0603f5fba93598d6f65869e8173ca275a70fd5a2ce2505a49b8eb5bdab962619605c1505dcd6d32a97

  • C:\Users\Admin\AppData\Local\Temp\RES69BB.tmp

    Filesize

    1KB

    MD5

    b92a039a82b60b6aab7aa8f5b6d76387

    SHA1

    f6600766ec40edba3b57673e02d23812e1cf7498

    SHA256

    3a37e2b7e73c94a7a1c96aa3bee5890ece5db02fb9e64fea361d3ff74892f403

    SHA512

    6ecbab48fcc07cb330e9e664fb2cbc60ceb07a714763f8f440238acd0a41eca35441bd6231227f1d704ab51184aed0a38d51f79fce040ed15979be69da71129a

  • C:\Users\Admin\AppData\Local\Temp\dukhj0xi\dukhj0xi.0.vb

    Filesize

    2KB

    MD5

    06db6c094be9241427eaa19ae1767077

    SHA1

    ffa7d6765d7df2bc06b695789ad16b86ec159be0

    SHA256

    26c60bffcfa069721089f41a08be0ed869e544e68ce3fac625139128023cadc9

    SHA512

    80798aaeb55af2991918e500316869de1b9a63f9a8b052b68ddad54df292176f528a12c081e9ebd45644b4dda1138264d83104bf3a92f1fb532ffea5ab14953b

  • C:\Users\Admin\AppData\Local\Temp\dukhj0xi\dukhj0xi.cmdline

    Filesize

    273B

    MD5

    3846f00aa770ed0fb7262146175e3554

    SHA1

    0bb4a68a23dc89f71a16959c5cf6a7c6b3e08178

    SHA256

    d121d691163c89fa6380f2c5851fca52adff31580de9cfdd13ebf659c09d59f3

    SHA512

    07836dedf1893ca834006e6c22f81f076e3c1c36d5261ab70d7370ac846c2420e0b4b84b740fd955b2fb389253825fd251039a158fba7beeee67d70ae877673d

  • C:\Users\Admin\AppData\Local\Temp\tmp67F8.tmp.exe

    Filesize

    12KB

    MD5

    4024eeb627db9f8b8502a19ccc571020

    SHA1

    d42c4ec246a15ec84c36607aa14f9ed97c706bf6

    SHA256

    690b66acff280e4a8658204da199462e98cfad58da8826844b7a2b0c4f0697e2

    SHA512

    925f03a3e28189eae19dcf1c69ffffc23ddba1a9ea9976a4858f87b47d4f94fc4f90b27619dd73d0b19c8cb6a7cff8a8e65c5d2e2309d49950299ee6b0c3cc55

  • C:\Users\Admin\AppData\Local\Temp\vbc9C2F1C51378476491B9FE45C29F8BC.TMP

    Filesize

    1KB

    MD5

    d81b5c3815381a752f61adad4eef414f

    SHA1

    c43ec929041d725a97e7d4d347d515dc8acf34cb

    SHA256

    ac68be610db090a8eb8f9cea4d8f7ad76895aaa44c86b2ffdd635fd611b476aa

    SHA512

    4aacb45fbf37e988d0c735dfd9a37403b712c4e153cd269507713645f816523b7ee6513ec3fd4a12849974425e439ae452a23b67dd666dbb97bb0d255dab880d

  • memory/2724-0-0x0000000073F4E000-0x0000000073F4F000-memory.dmp

    Filesize

    4KB

  • memory/2724-1-0x0000000000D40000-0x0000000000D4A000-memory.dmp

    Filesize

    40KB

  • memory/2724-7-0x0000000073F40000-0x000000007462E000-memory.dmp

    Filesize

    6.9MB

  • memory/2724-23-0x0000000073F40000-0x000000007462E000-memory.dmp

    Filesize

    6.9MB

  • memory/2828-24-0x0000000001000000-0x000000000100A000-memory.dmp

    Filesize

    40KB