Analysis
-
max time kernel
142s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
07-05-2023 05:45
Static task
static1
Behavioral task
behavioral1
Sample
af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe
Resource
win7-20230220-en
General
-
Target
af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe
-
Size
5.5MB
-
MD5
c48a400ccdb846dfeecdb8564ed29e6a
-
SHA1
a534f99c56d321e2b4cb111e5afbe38ee4dd2fd4
-
SHA256
af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e
-
SHA512
7c97935c18cf8bdb575d210b13ebc204c81b60b05036da6bbd3bf755d7a1277fe3e9012977a6d5f4573b52e2b0963c6364f56d0a2092f84909e51883ec02383b
-
SSDEEP
98304:097RqNuY64Jd70rj4uJUDFsPDDLuTw/mH8JVOYN8G3fPBuY5VGfiVC2jyi/HKqP6:+sNukdU4QN/mcJPVBuMAKsgqqP54
Malware Config
Extracted
systembc
5.45.73.25:4246
poolsforyour.com:4246
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CrystalDiskInfo.lnk af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp -
Executes dropped EXE 4 IoCs
pid Process 2156 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp 4012 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp 3432 lmsass.scr 2544 lmsass.sCr -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3432 lmsass.scr -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3432 set thread context of 2544 3432 lmsass.scr 92 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4012 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp 4012 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp 3432 lmsass.scr 3432 lmsass.scr 3432 lmsass.scr 3432 lmsass.scr -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 4012 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3432 lmsass.scr -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1376 wrote to memory of 2156 1376 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe 85 PID 1376 wrote to memory of 2156 1376 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe 85 PID 1376 wrote to memory of 2156 1376 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe 85 PID 2156 wrote to memory of 3160 2156 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp 86 PID 2156 wrote to memory of 3160 2156 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp 86 PID 2156 wrote to memory of 3160 2156 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp 86 PID 3160 wrote to memory of 4012 3160 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe 87 PID 3160 wrote to memory of 4012 3160 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe 87 PID 3160 wrote to memory of 4012 3160 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe 87 PID 4012 wrote to memory of 3432 4012 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp 88 PID 4012 wrote to memory of 3432 4012 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp 88 PID 4012 wrote to memory of 3432 4012 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp 88 PID 4012 wrote to memory of 4752 4012 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp 89 PID 4012 wrote to memory of 4752 4012 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp 89 PID 4012 wrote to memory of 4752 4012 af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp 89 PID 3432 wrote to memory of 2544 3432 lmsass.scr 92 PID 3432 wrote to memory of 2544 3432 lmsass.scr 92 PID 3432 wrote to memory of 2544 3432 lmsass.scr 92 PID 3432 wrote to memory of 2544 3432 lmsass.scr 92 PID 3432 wrote to memory of 2544 3432 lmsass.scr 92 PID 3432 wrote to memory of 2544 3432 lmsass.scr 92 PID 3432 wrote to memory of 2544 3432 lmsass.scr 92 PID 3432 wrote to memory of 2544 3432 lmsass.scr 92 PID 3432 wrote to memory of 2544 3432 lmsass.scr 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe"C:\Users\Admin\AppData\Local\Temp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\is-GLP0A.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp"C:\Users\Admin\AppData\Local\Temp\is-GLP0A.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp" /SL5="$B006A,5336595,180224,C:\Users\Admin\AppData\Local\Temp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe"C:\Users\Admin\AppData\Local\Temp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe" /verysilent /sp-3⤵
- Suspicious use of WriteProcessMemory
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\is-JJMKH.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp"C:\Users\Admin\AppData\Local\Temp\is-JJMKH.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp" /SL5="$C0058,5336595,180224,C:\Users\Admin\AppData\Local\Temp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.exe" /verysilent /sp-4⤵
- Drops startup file
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Roaming\CrystalDiskInfo8.17.4\lmsass.scr"C:\Users\Admin\AppData\Roaming\CrystalDiskInfo8.17.4\lmsass.scr"5⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Roaming\CrystalDiskInfo8.17.4\lmsass.sCr"C:\Users\Admin\AppData\Roaming\CrystalDiskInfo8.17.4\lmsass.sCr"6⤵
- Executes dropped EXE
PID:2544
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\.cmd""5⤵PID:4752
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
260B
MD54af21e3fc07cc9c73f4c50e7901c8c77
SHA194c18702bf325aaa2d9c90305d2fe153a9503062
SHA256bc5610e5d7384956a9b479ac767ef072daf46c92d952a6cf1db6fa2f31eae6d3
SHA512400bbde81b3e4fe9a3e92e07d34113982aefeeb7867c2c229f585ff02148924fe15fcefa6330992436540620b06702da4ae6192b92997e40d5003a4a99439e8c
-
Filesize
22KB
MD592dc6ef532fbb4a5c3201469a5b5eb63
SHA13e89ff837147c16b4e41c30d6c796374e0b8e62c
SHA2569884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87
SHA5129908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3
-
C:\Users\Admin\AppData\Local\Temp\is-GLP0A.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp
Filesize1.5MB
MD552b26165c6e3716fb6a13f90199b8945
SHA1af0276a652e8ee18b2275d1182305c78275852bb
SHA2569db907ea722ff077ccb615d1e78c9c948a019e820ea732a380f0e0ed1cf812bc
SHA51238e6623bc859addf36e8f9e4caecd0947338a56912c4fa6876af969138efcb3af4a65ccbe4f609bb81f07df87a73eb539b66a0508a51dc62a4295ba40d90b3c6
-
C:\Users\Admin\AppData\Local\Temp\is-GLP0A.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp
Filesize1.5MB
MD552b26165c6e3716fb6a13f90199b8945
SHA1af0276a652e8ee18b2275d1182305c78275852bb
SHA2569db907ea722ff077ccb615d1e78c9c948a019e820ea732a380f0e0ed1cf812bc
SHA51238e6623bc859addf36e8f9e4caecd0947338a56912c4fa6876af969138efcb3af4a65ccbe4f609bb81f07df87a73eb539b66a0508a51dc62a4295ba40d90b3c6
-
C:\Users\Admin\AppData\Local\Temp\is-JJMKH.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp
Filesize1.5MB
MD552b26165c6e3716fb6a13f90199b8945
SHA1af0276a652e8ee18b2275d1182305c78275852bb
SHA2569db907ea722ff077ccb615d1e78c9c948a019e820ea732a380f0e0ed1cf812bc
SHA51238e6623bc859addf36e8f9e4caecd0947338a56912c4fa6876af969138efcb3af4a65ccbe4f609bb81f07df87a73eb539b66a0508a51dc62a4295ba40d90b3c6
-
C:\Users\Admin\AppData\Local\Temp\is-JJMKH.tmp\af1679585c261a5a4490b7848e65d45b6bc030fa124e75cccc2ac28e615d041e.tmp
Filesize1.5MB
MD552b26165c6e3716fb6a13f90199b8945
SHA1af0276a652e8ee18b2275d1182305c78275852bb
SHA2569db907ea722ff077ccb615d1e78c9c948a019e820ea732a380f0e0ed1cf812bc
SHA51238e6623bc859addf36e8f9e4caecd0947338a56912c4fa6876af969138efcb3af4a65ccbe4f609bb81f07df87a73eb539b66a0508a51dc62a4295ba40d90b3c6
-
Filesize
5.3MB
MD51fe7083d76e76df3f3d571beb38669fb
SHA1dfd0b4769a35ec89b1e3a67f619d9e0437c7f022
SHA2563993cae18dd547c0a2836ee251f250f4e691b1947a81816695236c971f848b87
SHA512a1ed0ea9c5835fdc43715b547bf7630a73b3a4fc02243dfb05d1462cab194fc4f98b61a22698c62060d00654452f6a8cf158df3e7716a48062a867b67ca3fe70
-
Filesize
5.3MB
MD51fe7083d76e76df3f3d571beb38669fb
SHA1dfd0b4769a35ec89b1e3a67f619d9e0437c7f022
SHA2563993cae18dd547c0a2836ee251f250f4e691b1947a81816695236c971f848b87
SHA512a1ed0ea9c5835fdc43715b547bf7630a73b3a4fc02243dfb05d1462cab194fc4f98b61a22698c62060d00654452f6a8cf158df3e7716a48062a867b67ca3fe70
-
Filesize
5.3MB
MD51fe7083d76e76df3f3d571beb38669fb
SHA1dfd0b4769a35ec89b1e3a67f619d9e0437c7f022
SHA2563993cae18dd547c0a2836ee251f250f4e691b1947a81816695236c971f848b87
SHA512a1ed0ea9c5835fdc43715b547bf7630a73b3a4fc02243dfb05d1462cab194fc4f98b61a22698c62060d00654452f6a8cf158df3e7716a48062a867b67ca3fe70
-
Filesize
5.3MB
MD51fe7083d76e76df3f3d571beb38669fb
SHA1dfd0b4769a35ec89b1e3a67f619d9e0437c7f022
SHA2563993cae18dd547c0a2836ee251f250f4e691b1947a81816695236c971f848b87
SHA512a1ed0ea9c5835fdc43715b547bf7630a73b3a4fc02243dfb05d1462cab194fc4f98b61a22698c62060d00654452f6a8cf158df3e7716a48062a867b67ca3fe70