Analysis

  • max time kernel
    135s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/05/2023, 22:06

General

  • Target

    27f03bcd5cf9f3252316c1aea335f56dd9909c53832707b9f56033d1da98a0a1.exe

  • Size

    1.8MB

  • MD5

    7a3c047825bd8ab275ed90334619869f

  • SHA1

    4fece8f6b093bd2ca357ca0ef6a0b0ef82252ead

  • SHA256

    27f03bcd5cf9f3252316c1aea335f56dd9909c53832707b9f56033d1da98a0a1

  • SHA512

    aba717d72f2a8d2e9f92814e1abc0564131a653b87890fc60b3305b442eac1b16196e6958a498010dccc2d3a24a82346c00bd6f78f899c3f348a90d026705a13

  • SSDEEP

    24576:RhC37BlQeNxnsPbeOpbTXU8GmH7HuSpnSCFxnQYBgPazizYtTzxpTj0v/JIr:C37BxPpU98CcEOexRQW

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\27f03bcd5cf9f3252316c1aea335f56dd9909c53832707b9f56033d1da98a0a1.exe
    "C:\Users\Admin\AppData\Local\Temp\27f03bcd5cf9f3252316c1aea335f56dd9909c53832707b9f56033d1da98a0a1.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3476
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -u -p 1280 -s 1984
      2⤵
      • Program crash
      PID:5016
  • C:\Windows\system32\WerFault.exe
    C:\Windows\system32\WerFault.exe -pss -s 476 -p 1280 -ip 1280
    1⤵
      PID:228
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc UwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1884

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            2f57fde6b33e89a63cf0dfdd6e60a351

            SHA1

            445bf1b07223a04f8a159581a3d37d630273010f

            SHA256

            3b0068d29ae4b20c447227fbf410aa2deedfef6220ccc3f698f3c7707c032c55

            SHA512

            42857c5f111bfa163e9f4ea6b81a42233d0bbb0836ecc703ce7e8011b6f8a8eca761f39adc3ed026c9a2f99206d88bab9bddb42da9113e478a31a6382af5c220

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            1KB

            MD5

            fc28168b916bf9744961653d503e1164

            SHA1

            71deadab13b81a414582f931e9af010152463644

            SHA256

            a2a78e9fb30fe365d454ca6bbbf950355049c978262fdf0e80cd683622cf00e9

            SHA512

            08d828e18ccb2892f12dcbbaf5a5ffcafb4e2e768536fc46b3d2fce788c52b2f61058e1ef0a47e648e2308f4f1aeb8799bef9472726d2800fa9b775f401e08c9

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_oupn0nbx.nmd.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/1280-189-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-161-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-154-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-155-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-158-0x000001364E290000-0x000001364E291000-memory.dmp

            Filesize

            4KB

          • memory/1280-133-0x0000013633BA0000-0x0000013633D6C000-memory.dmp

            Filesize

            1.8MB

          • memory/1280-193-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-134-0x000001364E2B0000-0x000001364E2C0000-memory.dmp

            Filesize

            64KB

          • memory/1280-157-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-195-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-162-0x000001364E2B0000-0x000001364E2C0000-memory.dmp

            Filesize

            64KB

          • memory/1280-165-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-164-0x000001364E2B0000-0x000001364E2C0000-memory.dmp

            Filesize

            64KB

          • memory/1280-160-0x000001364ED30000-0x000001364EDD5000-memory.dmp

            Filesize

            660KB

          • memory/1280-167-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-169-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-171-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-173-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-175-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-177-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-179-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-181-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-183-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-185-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-187-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-135-0x0000013635A80000-0x0000013635AA2000-memory.dmp

            Filesize

            136KB

          • memory/1280-148-0x000001364E2B0000-0x000001364E2C0000-memory.dmp

            Filesize

            64KB

          • memory/1280-2484-0x000001364E2B0000-0x000001364E2C0000-memory.dmp

            Filesize

            64KB

          • memory/1280-191-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-197-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-199-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-201-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-203-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-205-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-207-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-209-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-211-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-213-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-215-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-217-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-219-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-221-0x000001364F860000-0x000001364F951000-memory.dmp

            Filesize

            964KB

          • memory/1280-1944-0x000001364E2B0000-0x000001364E2C0000-memory.dmp

            Filesize

            64KB

          • memory/1280-1942-0x000001364E2B0000-0x000001364E2C0000-memory.dmp

            Filesize

            64KB

          • memory/1280-2483-0x000001364E2B0000-0x000001364E2C0000-memory.dmp

            Filesize

            64KB

          • memory/1280-2482-0x000001364E2B0000-0x000001364E2C0000-memory.dmp

            Filesize

            64KB

          • memory/1884-2492-0x0000020E47010000-0x0000020E47020000-memory.dmp

            Filesize

            64KB

          • memory/1884-2493-0x0000020E47010000-0x0000020E47020000-memory.dmp

            Filesize

            64KB

          • memory/3476-147-0x000002137F5C0000-0x000002137F5D0000-memory.dmp

            Filesize

            64KB

          • memory/3476-146-0x000002137F5C0000-0x000002137F5D0000-memory.dmp

            Filesize

            64KB

          • memory/3476-145-0x000002137F5C0000-0x000002137F5D0000-memory.dmp

            Filesize

            64KB

          • memory/3476-149-0x000002137F5C0000-0x000002137F5D0000-memory.dmp

            Filesize

            64KB

          • memory/3476-150-0x000002137F5C0000-0x000002137F5D0000-memory.dmp

            Filesize

            64KB

          • memory/3476-151-0x000002137F5C0000-0x000002137F5D0000-memory.dmp

            Filesize

            64KB