Analysis

  • max time kernel
    135s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07-06-2023 19:47

General

  • Target

    b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543.exe

  • Size

    181KB

  • MD5

    e4af76b8468bdda40759b9dba353158a

  • SHA1

    1be63fb5990422544cc5291c44ac3b244e03a33f

  • SHA256

    b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543

  • SHA512

    d6bb952dec307c763d392312fc028728b77cce53d8bb96a8d7594ccc02bacf9bda39e4e1c2b574db7621a972bfa75747db33d4234ca424ff791581fc91859d73

  • SSDEEP

    3072:viFx+MrcRKO6ZWpY+38pa6XZNkPNfBACgg7gy0umoF8G:viFI7RKOj5gbXZNkO4gZVob

Score
7/10

Malware Config

Signatures

  • ASPack v2.12-2.42 14 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 51 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543.exe
    "C:\Users\Admin\AppData\Local\Temp\b4a192406d884b883010ab750cf51a1abb39e1e499527c3336c1c29179cfa543.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2680
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c dir /s /b "*.doc" "*.xls" "*.txt" "*.ppt" "*.docx" "*.xlsx" "*.pptx" "*.pdf" "*.mlf" "*.jpg" "*.png" "*.bmp" "*.rtf"
        3⤵
          PID:1420
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\BroadcastMsg_1676924548.txt"
          3⤵
          • Executes dropped EXE
          PID:2972
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\dd_NDP472-KB4054530-x86-x64-AllOS-ENU_decompression_log.txt"
          3⤵
          • Executes dropped EXE
          PID:3216
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI1657.txt"
          3⤵
          • Executes dropped EXE
          PID:2128
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistMSI168B.txt"
          3⤵
          • Executes dropped EXE
          PID:3804
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI1657.txt"
          3⤵
          • Executes dropped EXE
          PID:3232
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\dd_vcredistUI168B.txt"
          3⤵
          • Executes dropped EXE
          PID:4672
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\scoped_dir2860_1595044099\CRX_INSTALL\images\icon_128.png"
          3⤵
          • Executes dropped EXE
          PID:2924
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\scoped_dir2860_1595044099\CRX_INSTALL\images\icon_16.png"
          3⤵
          • Executes dropped EXE
          PID:924
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\scoped_dir2860_1595044099\CRX_INSTALL\images\topbar_floating_button.png"
          3⤵
          • Executes dropped EXE
          PID:4148
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\scoped_dir2860_1595044099\CRX_INSTALL\images\topbar_floating_button_close.png"
          3⤵
          • Executes dropped EXE
          PID:3652
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\scoped_dir2860_1595044099\CRX_INSTALL\images\topbar_floating_button_hover.png"
          3⤵
          • Executes dropped EXE
          PID:3968
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\scoped_dir2860_1595044099\CRX_INSTALL\images\topbar_floating_button_maximize.png"
          3⤵
          • Executes dropped EXE
          PID:4736
        • C:\Users\Admin\AppData\Local\Temp\1.exe
          1.exe "C:\Users\Admin\AppData\Local\Temp\scoped_dir2860_1595044099\CRX_INSTALL\images\topbar_floating_button_pressed.png"
          3⤵
          • Executes dropped EXE
          PID:1740
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c dir /s /b "*_*.doc" "*.xls" "*_*.txt" "*_*.ppt" "*_*.docx" "*_*.xlsx" "*_*.pptx" "*_*.pdf" "*_*.mlf" "*_*.jpg" "*_*.png" "*_*.bmp" "*_*.rtf"
          3⤵
            PID:4284
          • C:\Windows\SysWOW64\PING.EXE
            ping -n 3 127.0.0.1
            3⤵
            • Runs ping.exe
            PID:1160

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Remote System Discovery

      1
      T1018

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\0.bat
        Filesize

        939B

        MD5

        0d2ebfa607fbe73bf76ac43706f19290

        SHA1

        2b7cf161e158aaaeb32ad3b0e4ec1e166cdacc70

        SHA256

        4a2c767aa5231a1fb18e7c260572abf2692f311fd9c20955de12c45512b71870

        SHA512

        4d3a6bd525332114654ce86ffa5b837949fe77ed12ce9abfb5760eae839a5a3ed884bc9b95c572b6f2e1c14800a54e7a6be6ad21a585af67316ad28526948f6c

      • C:\Users\Admin\AppData\Local\Temp\0.bat
        Filesize

        939B

        MD5

        0d2ebfa607fbe73bf76ac43706f19290

        SHA1

        2b7cf161e158aaaeb32ad3b0e4ec1e166cdacc70

        SHA256

        4a2c767aa5231a1fb18e7c260572abf2692f311fd9c20955de12c45512b71870

        SHA512

        4d3a6bd525332114654ce86ffa5b837949fe77ed12ce9abfb5760eae839a5a3ed884bc9b95c572b6f2e1c14800a54e7a6be6ad21a585af67316ad28526948f6c

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • C:\Users\Admin\AppData\Local\Temp\1.exe
        Filesize

        41KB

        MD5

        1b9f50b972ba520df3a5883e94058b2f

        SHA1

        303471507dc565f6588e7b89b0e95b55daae94ed

        SHA256

        855fe75a1998575564f223a87cfd244cc42fb2814d9563ed33af2e4d82284a68

        SHA512

        4fce9642e07c42a81e2f8bacbba902423b97f432b9231230a7e29f73dafde35d8cb30295ee99512dfb8ff742cb82ac7e76a67a7a6c75c72b489e9ab4da0d6fc6

      • memory/924-177-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/924-176-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/924-178-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/1740-198-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/1740-197-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/1740-196-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/2128-156-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/2128-155-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/2128-154-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/2680-158-0x0000000000400000-0x000000000044E000-memory.dmp
        Filesize

        312KB

      • memory/2680-133-0x0000000000400000-0x000000000044E000-memory.dmp
        Filesize

        312KB

      • memory/2924-172-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/2924-173-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/2924-174-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/2972-148-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/2972-147-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/2972-146-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3216-152-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3216-151-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3216-150-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3232-166-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3232-164-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3232-165-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3652-184-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3652-186-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3652-185-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3804-159-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3804-160-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3804-161-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3804-162-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3968-188-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3968-190-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/3968-189-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/4148-180-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/4148-182-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/4148-181-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/4672-170-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB

      • memory/4736-194-0x0000000000C60000-0x0000000000C8F000-memory.dmp
        Filesize

        188KB