Analysis

  • max time kernel
    125s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    28/03/2025, 14:38

General

  • Target

    1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe

  • Size

    1.7MB

  • MD5

    aaf6a5281734233732b8d9bc038ee684

  • SHA1

    1585ef28a6ef1495e3ddecf8e382c046307e4335

  • SHA256

    1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed

  • SHA512

    f134b2553222e3254d6203bd316d02956a533e8b970d983822b586dd53d4e8b8bda4253d88f3200a9bad806841d9428179bc0146f62a9c134abc43827b153d1a

  • SSDEEP

    49152:Wv9SvM4c6bEgejrfFG0A5g8homh6+y6W3qMqs4y4qT8p6C+Kx5:WEvM4c6bEgejrfFG0A5gWoHX6W6nhZqY

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • VMProtect packed file 19 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 38 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe
    "C:\Users\Admin\AppData\Local\Temp\1ee2088e230eb0a9fed751199454d995844f7d42ecd99f99389d2c6de45575ed.exe"
    1⤵
    • Downloads MZ/PE file
    • Loads dropped DLL
    • Enumerates connected drives
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Users\Admin\AppData\Local\Temp\KB8697411D9777BD96.exe
      "C:\Users\Admin\AppData\Local\Temp\KB8697411D9777BD96.exe" --silent --make_default=1 --rfr=800437 --ua_rfr=CHANNEL_800437 "--partner_new_url=http://horses.jacketrescue.ru/v_install?sid=16045&guid=$__GUID&sig=$__SIG&ovr=$__OVR&amigo=1&label=800437&aux=66668674" "--partner_firstonline_url=http://horses.jacketrescue.ru/v_touch?guid=$__GUID&sig=$__SIG"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:112
      • C:\Users\Admin\AppData\Local\Temp\loader_ldir_112_26397\KB8697411D9777BD96.exe
        C:\Users\Admin\AppData\Local\Temp\loader_ldir_112_26397\KB8697411D9777BD96.exe --silent --rfr=800437 --ua_rfr=CHANNEL_800437 --partner_new_url=http://horses.jacketrescue.ru/v_install?sid=16045&guid=$__GUID&sig=$__SIG&ovr=$__OVR&amigo=1&label=800437&aux=66668674 --cp
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:1204
    • C:\Users\Admin\AppData\Local\Temp\KB57D08FF360EC9FC4.exe
      "C:\Users\Admin\AppData\Local\Temp\KB57D08FF360EC9FC4.exe" "--silent" "--without-updater" "--rfr=hp.1:802811,dse.1:802821,vbm.1:802831,hp.2:802851,dse.2:802861,vbm.2:802871,any.2:802801,any:802841" "--pay_browser_class=0" "--install_callback=http://horses.jacketrescue.ru/v_install?aux=66668674&hash=juQFvcSND95z96IC&sig=6c46d97dabf7647e884878d2b8b3c47a&guid={guid}&browser={browser}&{component}=1&browserclass1={browserClass1}&browserclass2={browserClass2}&paid={paid}&pb={paidBrowser}&pa={paidAction}&ibc={installBrowserClass}&pbc={payBrowserClass}&ur={unpaidActionReason}&sid=16045&label_dse=802821&label_hp=802811&label_vbm=802831&label_ndef=802801&label_dse_ndef=802861&label_hp_ndef=802851&label_vbm_ndef=802871" "--partner_product_online=http://horses.jacketrescue.ru/affect?guid={guid}&sid=16045&homesearch=1&label=811008&label_dse=802821&label_hp=802811&label_vbm=802831&label_ndef=802801&label_dse_ndef=802861&label_hp_ndef=802851&label_vbm_ndef=802871"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2072

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\KB57D08FF360EC9FC4.exe

    Filesize

    2.0MB

    MD5

    a29c9f523b47027fb97190b908c18979

    SHA1

    203ca880efa5e1c883f37ad56a4b0e832b813a15

    SHA256

    25ceeaed228c2d7c08bad41362ad6619c243324ad8a0e05c75d3672e96373bed

    SHA512

    2d5383fd32060064843ff66be6f0477d36bb8eb0d348305700563fbb737ceddc14e0589ec78f922e9baa96e00c1487512f32fe92951229d5277db3701936d8c3

  • C:\Users\Admin\AppData\Local\Temp\KB57D08FF360EC9FC4.exe

    Filesize

    128KB

    MD5

    4a8a7eae2a28831d101e754b125ce042

    SHA1

    a9a4cbe2e7a3ea02d952506954c472517f58d383

    SHA256

    5a864f47af1cded89dd57fd6dad3b46c8fa4769363ab1fa560092b557df449b9

    SHA512

    5a35816b40c4659150023d0413f2440619b0202aca2772151c7b6d34d8007d65745b769cbc2ce85d8c30c9a0a9056e440b47ba930859904bd4829b69e05e9ada

  • \Users\Admin\AppData\Local\Temp\KB8697411D9777BD96.exe

    Filesize

    554KB

    MD5

    b2b97b5f2ffe8603788a49b7105baa82

    SHA1

    98b854520f4fe748a9ae54c8abe710f99da6acbc

    SHA256

    fe03edbc99e3728745e19e800195fbd795476cd503903eef3714eee5e675f760

    SHA512

    207608bd5529aaeab90b800beacdea9e2700c7a22117e2866c8809f3018d1f42694c50fe379e6d355db49dc93206f340b998d4b9ae2d30cab95fdebdfe549c56

  • memory/2804-15-0x00000000052E0000-0x00000000057EA000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-17-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-8-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-4-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-5-0x0000000000240000-0x0000000000241000-memory.dmp

    Filesize

    4KB

  • memory/2804-7-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-10-0x0000000000401000-0x00000000004AF000-memory.dmp

    Filesize

    696KB

  • memory/2804-11-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-12-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-13-0x0000000004960000-0x0000000004962000-memory.dmp

    Filesize

    8KB

  • memory/2804-14-0x00000000052E0000-0x00000000057EA000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-0-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-16-0x00000000002E0000-0x0000000000309000-memory.dmp

    Filesize

    164KB

  • memory/2804-9-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-18-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-19-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-22-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-23-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-24-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-25-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-26-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-27-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-28-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-29-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-3-0x0000000000400000-0x000000000090A000-memory.dmp

    Filesize

    5.0MB

  • memory/2804-2-0x00000000002E0000-0x0000000000309000-memory.dmp

    Filesize

    164KB

  • memory/2804-1-0x00000000002E0000-0x0000000000309000-memory.dmp

    Filesize

    164KB