Analysis

  • max time kernel
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/07/2023, 18:23

General

  • Target

    883.exe

  • Size

    521KB

  • MD5

    be53c8cde0b835bd127e30b68247d7a7

  • SHA1

    cf56dab68b481410510a26f431da342447e623b2

  • SHA256

    00f20471ea61f5b0f5a1e2e9be722369ea515aaea80283aa046bd47e51f952e4

  • SHA512

    f30822eb3e9be283cd7c2c9a7347096694c1c16237067ff41a5e0f2d173ff43ba29350c357af83fb1edc205d83a0d0b958f6a26d306530be3456b14b8cf073eb

  • SSDEEP

    12288:5tIKC3GVt3GxyIBlAkD+0nMCI31q3Zofhd04WPls89iCVgUP:7G2Vt2w4i++0M5+ZAWts891VVP

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\883.exe
    "C:\Users\Admin\AppData\Local\Temp\883.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
      "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\883.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\putin.exe.exe'
      2⤵
      • Drops startup file
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3780
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3624

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_crtqdolp.cam.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1252-197-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-134-0x0000000005840000-0x00000000058D2000-memory.dmp

    Filesize

    584KB

  • memory/1252-136-0x0000000005D60000-0x0000000005D72000-memory.dmp

    Filesize

    72KB

  • memory/1252-137-0x00000000059D0000-0x00000000059E0000-memory.dmp

    Filesize

    64KB

  • memory/1252-138-0x0000000005E20000-0x0000000005EBC000-memory.dmp

    Filesize

    624KB

  • memory/1252-205-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-203-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-201-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-199-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-133-0x0000000000E30000-0x0000000000EB8000-memory.dmp

    Filesize

    544KB

  • memory/1252-194-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-192-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-174-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-155-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-156-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-158-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-160-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-162-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-164-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-166-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-168-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-170-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-135-0x0000000005F90000-0x0000000006534000-memory.dmp

    Filesize

    5.6MB

  • memory/1252-172-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-190-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-178-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-180-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-182-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-184-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-186-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-188-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/1252-176-0x0000000005D80000-0x0000000005DA3000-memory.dmp

    Filesize

    140KB

  • memory/3624-208-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3624-206-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3624-216-0x0000000000400000-0x0000000000430000-memory.dmp

    Filesize

    192KB

  • memory/3624-215-0x0000000002BF0000-0x0000000002F3A000-memory.dmp

    Filesize

    3.3MB

  • memory/3780-209-0x0000000007420000-0x00000000074B6000-memory.dmp

    Filesize

    600KB

  • memory/3780-145-0x0000000005E20000-0x0000000005E86000-memory.dmp

    Filesize

    408KB

  • memory/3780-195-0x0000000006450000-0x000000000646E000-memory.dmp

    Filesize

    120KB

  • memory/3780-140-0x00000000056C0000-0x0000000005CE8000-memory.dmp

    Filesize

    6.2MB

  • memory/3780-142-0x0000000002B80000-0x0000000002B90000-memory.dmp

    Filesize

    64KB

  • memory/3780-141-0x0000000002B80000-0x0000000002B90000-memory.dmp

    Filesize

    64KB

  • memory/3780-139-0x0000000002B10000-0x0000000002B46000-memory.dmp

    Filesize

    216KB

  • memory/3780-210-0x0000000006910000-0x000000000692A000-memory.dmp

    Filesize

    104KB

  • memory/3780-211-0x0000000006960000-0x0000000006982000-memory.dmp

    Filesize

    136KB

  • memory/3780-143-0x0000000005590000-0x00000000055B2000-memory.dmp

    Filesize

    136KB

  • memory/3780-144-0x0000000005630000-0x0000000005696000-memory.dmp

    Filesize

    408KB