Analysis

  • max time kernel
    72s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/06/2023, 15:10

General

  • Target

    PXU422.exe

  • Size

    753KB

  • MD5

    6a6816bc6f0c4e9da9f8b5ed0863eed1

  • SHA1

    56d2c76029c5d2036a697f2b9f1e5f9564f7c2ee

  • SHA256

    a278b60ab0bd9823527c0d86509a3a5f31f107e4f8e70761cd62395e27738a0f

  • SHA512

    ad7830f9a85858ce057832611527fddd4d6bc0ad0a01a1d6dd362fd360ef354f405a627d123aba42987e4cdffc1b36a4940e4ec59c1df43e8394f5fe2cf56b4e

  • SSDEEP

    12288:rKewx/NscEQ+vgXK1Hsa+cmKo1W5qlp1HoADehqfx7b5w4JC2Off03i0mMRry8B+:eewlqB6p5pKosquA0a7C4JCan9y8Ae5Q

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\PXU422.exe
    "C:\Users\Admin\AppData\Local\Temp\PXU422.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3448
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pEtRWDrPAr.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4844
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pEtRWDrPAr" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1E07.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1016
    • C:\Users\Admin\AppData\Local\Temp\PXU422.exe
      "C:\Users\Admin\AppData\Local\Temp\PXU422.exe"
      2⤵
        PID:2476
      • C:\Users\Admin\AppData\Local\Temp\PXU422.exe
        "C:\Users\Admin\AppData\Local\Temp\PXU422.exe"
        2⤵
          PID:1608
        • C:\Users\Admin\AppData\Local\Temp\PXU422.exe
          "C:\Users\Admin\AppData\Local\Temp\PXU422.exe"
          2⤵
            PID:3156
          • C:\Users\Admin\AppData\Local\Temp\PXU422.exe
            "C:\Users\Admin\AppData\Local\Temp\PXU422.exe"
            2⤵
              PID:1476
            • C:\Users\Admin\AppData\Local\Temp\PXU422.exe
              "C:\Users\Admin\AppData\Local\Temp\PXU422.exe"
              2⤵
                PID:4968

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_f5tfx23x.kvj.ps1

              Filesize

              60B

              MD5

              d17fe0a3f47be24a6453e9ef58c94641

              SHA1

              6ab83620379fc69f80c0242105ddffd7d98d5d9d

              SHA256

              96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

              SHA512

              5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

            • C:\Users\Admin\AppData\Local\Temp\tmp1E07.tmp

              Filesize

              1KB

              MD5

              8f7e5a7153e2aed35702a7f5930fec48

              SHA1

              34aeda68b568f6f2aa643b51841862179586d3a9

              SHA256

              8b7fa33e212ffab3e95d7fd2659e6684e655960cd0c11ba0e3d89c594d9fa7a6

              SHA512

              3b42a0bc78eec9b6b13da8a6fe114a54caecdafe445ef4408fdafd9f952e9477eeada4e39d8c12c7be3281973e1d2aa000429217939740f722dc6f511ddb88d9

            • memory/3448-134-0x0000000005740000-0x0000000005CE4000-memory.dmp

              Filesize

              5.6MB

            • memory/3448-135-0x00000000050E0000-0x0000000005172000-memory.dmp

              Filesize

              584KB

            • memory/3448-136-0x0000000005280000-0x000000000528A000-memory.dmp

              Filesize

              40KB

            • memory/3448-137-0x00000000052D0000-0x00000000052E0000-memory.dmp

              Filesize

              64KB

            • memory/3448-138-0x00000000052D0000-0x00000000052E0000-memory.dmp

              Filesize

              64KB

            • memory/3448-139-0x0000000006E60000-0x0000000006EFC000-memory.dmp

              Filesize

              624KB

            • memory/3448-133-0x0000000000660000-0x0000000000722000-memory.dmp

              Filesize

              776KB

            • memory/4844-160-0x0000000000C90000-0x0000000000CA0000-memory.dmp

              Filesize

              64KB

            • memory/4844-164-0x0000000070DD0000-0x0000000070E1C000-memory.dmp

              Filesize

              304KB

            • memory/4844-149-0x0000000004AC0000-0x0000000004B26000-memory.dmp

              Filesize

              408KB

            • memory/4844-150-0x0000000005390000-0x00000000053F6000-memory.dmp

              Filesize

              408KB

            • memory/4844-146-0x0000000004D60000-0x0000000005388000-memory.dmp

              Filesize

              6.2MB

            • memory/4844-144-0x0000000000C40000-0x0000000000C76000-memory.dmp

              Filesize

              216KB

            • memory/4844-161-0x0000000000C90000-0x0000000000CA0000-memory.dmp

              Filesize

              64KB

            • memory/4844-162-0x00000000059E0000-0x00000000059FE000-memory.dmp

              Filesize

              120KB

            • memory/4844-163-0x0000000005FB0000-0x0000000005FE2000-memory.dmp

              Filesize

              200KB

            • memory/4844-148-0x0000000004A20000-0x0000000004A42000-memory.dmp

              Filesize

              136KB

            • memory/4844-174-0x0000000005F80000-0x0000000005F9E000-memory.dmp

              Filesize

              120KB

            • memory/4844-175-0x0000000000C90000-0x0000000000CA0000-memory.dmp

              Filesize

              64KB

            • memory/4844-176-0x000000007EFA0000-0x000000007EFB0000-memory.dmp

              Filesize

              64KB

            • memory/4844-177-0x0000000007330000-0x00000000079AA000-memory.dmp

              Filesize

              6.5MB

            • memory/4844-178-0x0000000006CF0000-0x0000000006D0A000-memory.dmp

              Filesize

              104KB

            • memory/4844-179-0x0000000006D60000-0x0000000006D6A000-memory.dmp

              Filesize

              40KB

            • memory/4844-180-0x0000000006F70000-0x0000000007006000-memory.dmp

              Filesize

              600KB

            • memory/4844-181-0x0000000006F20000-0x0000000006F2E000-memory.dmp

              Filesize

              56KB

            • memory/4844-182-0x0000000007030000-0x000000000704A000-memory.dmp

              Filesize

              104KB

            • memory/4844-183-0x0000000007010000-0x0000000007018000-memory.dmp

              Filesize

              32KB