Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/03/2023, 17:05

General

  • Target

    Copia_de_pago_sin_783947.exe

  • Size

    1.2MB

  • MD5

    70c205ed1ec81ac0a9aa8f33fda26a22

  • SHA1

    a2fde78603ad86a828b9a4680ff26c313d8bcd7a

  • SHA256

    1b5f369c7130b28ca132dee4fdbf98f31adb433b203088c29c198244da57ce76

  • SHA512

    99f0fd1425f3c96328e4594f6514bee76ddfbad0f345c31069a993d9721c611d75fa070cd1f5d4f5d244d8b94b3bf262d278401c2338b3bbef0ff2c8afdf1eff

  • SSDEEP

    12288:1jMOEAlI3MzSSV93D4CsuwlmMiy7h5cilEv7NvbXK89eiDlb89zbydfCwKGcH0kb:1IYdSS/Q3g3yEiCv7NvH4O58cdaecU2

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3180
    • C:\Users\Admin\AppData\Local\Temp\Copia_de_pago_sin_783947.exe
      "C:\Users\Admin\AppData\Local\Temp\Copia_de_pago_sin_783947.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3120
      • C:\Users\Admin\AppData\Local\Temp\Copia_de_pago_sin_783947.exe
        "C:\Users\Admin\AppData\Local\Temp\Copia_de_pago_sin_783947.exe"
        3⤵
          PID:4328
        • C:\Users\Admin\AppData\Local\Temp\Copia_de_pago_sin_783947.exe
          "C:\Users\Admin\AppData\Local\Temp\Copia_de_pago_sin_783947.exe"
          3⤵
            PID:4664
          • C:\Users\Admin\AppData\Local\Temp\Copia_de_pago_sin_783947.exe
            "C:\Users\Admin\AppData\Local\Temp\Copia_de_pago_sin_783947.exe"
            3⤵
            • Checks computer location settings
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:4200
        • C:\Windows\SysWOW64\svchost.exe
          "C:\Windows\SysWOW64\svchost.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4712
          • C:\Program Files\Mozilla Firefox\Firefox.exe
            "C:\Program Files\Mozilla Firefox\Firefox.exe"
            3⤵
              PID:5016
              • C:\Windows\system32\WerFault.exe
                C:\Windows\system32\WerFault.exe -u -p 5016 -s 128
                4⤵
                • Program crash
                PID:1844
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -pss -s 444 -p 5016 -ip 5016
          1⤵
            PID:2892

          Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/3120-137-0x0000000005770000-0x0000000005D14000-memory.dmp

                  Filesize

                  5.6MB

                • memory/3120-138-0x00000000051C0000-0x0000000005252000-memory.dmp

                  Filesize

                  584KB

                • memory/3120-139-0x0000000005150000-0x000000000515A000-memory.dmp

                  Filesize

                  40KB

                • memory/3120-140-0x0000000005390000-0x00000000053A0000-memory.dmp

                  Filesize

                  64KB

                • memory/3120-141-0x0000000005390000-0x00000000053A0000-memory.dmp

                  Filesize

                  64KB

                • memory/3120-142-0x0000000006180000-0x000000000621C000-memory.dmp

                  Filesize

                  624KB

                • memory/3120-136-0x0000000000660000-0x000000000079A000-memory.dmp

                  Filesize

                  1.2MB

                • memory/3180-149-0x0000000008290000-0x00000000083A1000-memory.dmp

                  Filesize

                  1.1MB

                • memory/3180-160-0x0000000002E20000-0x0000000002ED8000-memory.dmp

                  Filesize

                  736KB

                • memory/3180-158-0x0000000002E20000-0x0000000002ED8000-memory.dmp

                  Filesize

                  736KB

                • memory/3180-157-0x0000000002E20000-0x0000000002ED8000-memory.dmp

                  Filesize

                  736KB

                • memory/4200-147-0x0000000000400000-0x000000000042F000-memory.dmp

                  Filesize

                  188KB

                • memory/4200-148-0x0000000001080000-0x0000000001090000-memory.dmp

                  Filesize

                  64KB

                • memory/4200-152-0x0000000000400000-0x000000000042F000-memory.dmp

                  Filesize

                  188KB

                • memory/4200-146-0x0000000000400000-0x000000000042F000-memory.dmp

                  Filesize

                  188KB

                • memory/4200-145-0x0000000001530000-0x000000000187A000-memory.dmp

                  Filesize

                  3.3MB

                • memory/4200-143-0x0000000000400000-0x000000000042F000-memory.dmp

                  Filesize

                  188KB

                • memory/4712-150-0x00000000006B0000-0x00000000006BE000-memory.dmp

                  Filesize

                  56KB

                • memory/4712-153-0x00000000006B0000-0x00000000006BE000-memory.dmp

                  Filesize

                  56KB

                • memory/4712-154-0x00000000004D0000-0x00000000004FD000-memory.dmp

                  Filesize

                  180KB

                • memory/4712-155-0x0000000001000000-0x000000000134A000-memory.dmp

                  Filesize

                  3.3MB

                • memory/4712-156-0x0000000001350000-0x00000000013DF000-memory.dmp

                  Filesize

                  572KB