Analysis

  • max time kernel
    123s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2023, 09:38

General

  • Target

    67fec5705cd2acexeexeexeex.exe

  • Size

    288KB

  • MD5

    67fec5705cd2ac62c5672aa762970a87

  • SHA1

    fed83862b63d9af3b173d6abdb82ac20d1199d29

  • SHA256

    f5e7ec25b1a88f8aa126974cfeb0f202e9b4fc501af19976a7881689b40fa5cf

  • SHA512

    53bd9c1fee624fe88b8714105bbc4af0f3e615fc8be0b97063bb19826d2595f61eb4f7502daee549e3ea85151b3fb4702d31b1756b68486a828c079c4c1309d7

  • SSDEEP

    6144:fQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:fQMyfmNFHfnWfhLZVHmOog

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\67fec5705cd2acexeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\67fec5705cd2acexeexeexeex.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1904
    • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3144
      • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe"
        3⤵
        • Executes dropped EXE
        PID:3732

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe

          Filesize

          288KB

          MD5

          313a8f442e2fb1cb1c6c6a1cc14b988f

          SHA1

          8c4f4b0ef5fd480fce3268c18ef600c1c00c126f

          SHA256

          f881bcb59d49cd9b6c896b2086570aac3f8f34fd5e56b70fb3bcdd6c71af1dac

          SHA512

          5771b8727c7a478637f34d9d90190d37e3ee2ac4f53c05bde7a2550313fb0d04743197d8f744ae080fe68fa856b29268571712e2c10c2ba85d469d3c0244e0a9

        • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe

          Filesize

          288KB

          MD5

          313a8f442e2fb1cb1c6c6a1cc14b988f

          SHA1

          8c4f4b0ef5fd480fce3268c18ef600c1c00c126f

          SHA256

          f881bcb59d49cd9b6c896b2086570aac3f8f34fd5e56b70fb3bcdd6c71af1dac

          SHA512

          5771b8727c7a478637f34d9d90190d37e3ee2ac4f53c05bde7a2550313fb0d04743197d8f744ae080fe68fa856b29268571712e2c10c2ba85d469d3c0244e0a9

        • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe

          Filesize

          288KB

          MD5

          313a8f442e2fb1cb1c6c6a1cc14b988f

          SHA1

          8c4f4b0ef5fd480fce3268c18ef600c1c00c126f

          SHA256

          f881bcb59d49cd9b6c896b2086570aac3f8f34fd5e56b70fb3bcdd6c71af1dac

          SHA512

          5771b8727c7a478637f34d9d90190d37e3ee2ac4f53c05bde7a2550313fb0d04743197d8f744ae080fe68fa856b29268571712e2c10c2ba85d469d3c0244e0a9

        • C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\dwmsys.exe

          Filesize

          288KB

          MD5

          313a8f442e2fb1cb1c6c6a1cc14b988f

          SHA1

          8c4f4b0ef5fd480fce3268c18ef600c1c00c126f

          SHA256

          f881bcb59d49cd9b6c896b2086570aac3f8f34fd5e56b70fb3bcdd6c71af1dac

          SHA512

          5771b8727c7a478637f34d9d90190d37e3ee2ac4f53c05bde7a2550313fb0d04743197d8f744ae080fe68fa856b29268571712e2c10c2ba85d469d3c0244e0a9