Analysis

  • max time kernel
    135s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-05-2023 07:29

General

  • Target

    a3dcdea3742a9668f9230bf9e13ab30bd3105320f2dd6dc89d3e915514d1371e.exe

  • Size

    1.7MB

  • MD5

    68661e1b672e6c4d8a54cc7b3e8d0d09

  • SHA1

    fa98af2753e3bbb08d33b5de153a82bbe88db85f

  • SHA256

    a3dcdea3742a9668f9230bf9e13ab30bd3105320f2dd6dc89d3e915514d1371e

  • SHA512

    509e209e37fbe476b6d17f81333807cb17edf9961a71d8623648e8b53945953f90b08af7b47abb4f32cacfe8bcd5b60494693eebfe899b8e38cfeb4199053c4c

  • SSDEEP

    49152:ARF+DMpCcZXq1aeJxmqw3OroHERzbqvTJoBL1LHkcB2KWfb+19CSPx6ASRc:AWgpCcdq7J/w3OrkERzbqvTJoBLlHha/

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 58 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3dcdea3742a9668f9230bf9e13ab30bd3105320f2dd6dc89d3e915514d1371e.exe
    "C:\Users\Admin\AppData\Local\Temp\a3dcdea3742a9668f9230bf9e13ab30bd3105320f2dd6dc89d3e915514d1371e.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\SysWOW64\regsvr32.exe
      "C:\Windows\System32\regsvr32.exe" /s /u "C:\Program Files (x86)\SecCertClientFjqy\\PlatformCom.dll"
      2⤵
        PID:3064
      • C:\Windows\SysWOW64\regsvr32.exe
        "C:\Windows\System32\regsvr32.exe" /s /u "C:\Program Files (x86)\SecCertClientFjqy\\KeyMgr.ocx"
        2⤵
          PID:2408
        • C:\Windows\SysWOW64\regsvr32.exe
          "C:\Windows\System32\regsvr32.exe" /s /u "C:\Program Files (x86)\SecCertClientFjqy\\Sec.ocx"
          2⤵
            PID:4608
          • C:\Windows\SysWOW64\regsvr32.exe
            "C:\Windows\System32\regsvr32.exe" /s /u "C:\Program Files (x86)\SecCertClientFjqy\\Platform.ocx"
            2⤵
              PID:5068
            • C:\Windows\SysWOW64\regsvr32.exe
              "C:\Windows\System32\regsvr32.exe" /s /u "C:\Program Files (x86)\SecCertClientFjqy\\fjcaControl.ocx"
              2⤵
                PID:2828
              • C:\Windows\SysWOW64\regsvr32.exe
                "C:\Windows\System32\regsvr32.exe" /s /u "C:\Program Files (x86)\SecCertClientFjqy\\KSEnAndSignCtl.ocx"
                2⤵
                  PID:2928
                • C:\Windows\SysWOW64\regsvr32.exe
                  "C:\Windows\System32\regsvr32.exe" /s /u "C:\Program Files (x86)\SecCertClientFjqy\\FJCASOF_SM2_OCX.ocx"
                  2⤵
                    PID:4708
                  • C:\Windows\SysWOW64\regsvr32.exe
                    "C:\Windows\System32\regsvr32.exe" /s /u "C:\Program Files (x86)\SecCertClientFjqy\\SBFjCAEnAndSign.ocx"
                    2⤵
                      PID:4156
                    • C:\Windows\SysWOW64\regsvr32.exe
                      "C:\Windows\System32\regsvr32.exe" /s /u "C:\Program Files (x86)\SecCertClientFjqy\\CertType.ocx"
                      2⤵
                        PID:212
                      • C:\Windows\SysWOW64\regsvr32.exe
                        "C:\Windows\System32\regsvr32.exe" /s /u "C:\Program Files (x86)\SecCertClientFjqy\\CertAux.ocx"
                        2⤵
                          PID:1872
                        • C:\Windows\SysWOW64\regsvr32.exe
                          "C:\Windows\System32\regsvr32.exe" /s /u "C:\Program Files (x86)\SecCertClientFjqy\\CertOper.ocx"
                          2⤵
                            PID:4000
                          • C:\Windows\SysWOW64\regsvr32.exe
                            "C:\Windows\System32\regsvr32.exe" /s /u "C:\Program Files (x86)\SecCertClientFjqy\\KoalCertCtl.ocx"
                            2⤵
                              PID:4508
                            • C:\Windows\SysWOW64\regsvr32.exe
                              "C:\Windows\System32\regsvr32.exe" /s /u "C:\Program Files (x86)\SecCertClientFjqy\\fjcaupccerttool.ocx"
                              2⤵
                                PID:4468
                              • C:\Windows\SysWOW64\regsvr32.exe
                                "C:\Windows\System32\regsvr32.exe" /s /u "C:\Windows\system32\\klFileRW.dll"
                                2⤵
                                  PID:4872

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads