Analysis

  • max time kernel
    142s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2023, 09:46

General

  • Target

    6910969188b405exeexeexeex.exe

  • Size

    288KB

  • MD5

    6910969188b405b93db4b146cbd5f718

  • SHA1

    7988974c85d5eea21207c8d6fdcb8d1aace185e5

  • SHA256

    8aec47f63039904e0e1144fb18378f2b18d5cfbf41c5dcd65bdef258323df648

  • SHA512

    52c99b5d7357336f1dc95caa0e67a0e8b39a4a6ab43e3a1c46ef8cab46da07f0c6cbc1fef427f3a3de3c20a95304faee1a8fcab01f7314f0a153ed6267dd6253

  • SSDEEP

    6144:LQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:LQMyfmNFHfnWfhLZVHmOog

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6910969188b405exeexeexeex.exe
    "C:\Users\Admin\AppData\Local\Temp\6910969188b405exeexeexeex.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2212
    • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe"
        3⤵
        • Executes dropped EXE
        PID:2912

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe

    Filesize

    288KB

    MD5

    34604b183372313ee3428cf5216a1320

    SHA1

    059eefa00324b0288a5b96b2305c366b5c5f9ffc

    SHA256

    0926b53810ef4b8d8cc624d91bfcdedafa0ac53b0f1222a1772b64954093ccea

    SHA512

    a80d38bf6ab9efad1667861ed78ce9dcfb403d959f9773b3871a11cdd5a32dd29a71b0378557a70af81f84ed1efbbb6ec93af298724909d750753010379d24d3

  • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe

    Filesize

    288KB

    MD5

    34604b183372313ee3428cf5216a1320

    SHA1

    059eefa00324b0288a5b96b2305c366b5c5f9ffc

    SHA256

    0926b53810ef4b8d8cc624d91bfcdedafa0ac53b0f1222a1772b64954093ccea

    SHA512

    a80d38bf6ab9efad1667861ed78ce9dcfb403d959f9773b3871a11cdd5a32dd29a71b0378557a70af81f84ed1efbbb6ec93af298724909d750753010379d24d3

  • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe

    Filesize

    288KB

    MD5

    34604b183372313ee3428cf5216a1320

    SHA1

    059eefa00324b0288a5b96b2305c366b5c5f9ffc

    SHA256

    0926b53810ef4b8d8cc624d91bfcdedafa0ac53b0f1222a1772b64954093ccea

    SHA512

    a80d38bf6ab9efad1667861ed78ce9dcfb403d959f9773b3871a11cdd5a32dd29a71b0378557a70af81f84ed1efbbb6ec93af298724909d750753010379d24d3

  • C:\Users\Admin\AppData\Roaming\Microsoft\XMMC\taskhostsys.exe

    Filesize

    288KB

    MD5

    34604b183372313ee3428cf5216a1320

    SHA1

    059eefa00324b0288a5b96b2305c366b5c5f9ffc

    SHA256

    0926b53810ef4b8d8cc624d91bfcdedafa0ac53b0f1222a1772b64954093ccea

    SHA512

    a80d38bf6ab9efad1667861ed78ce9dcfb403d959f9773b3871a11cdd5a32dd29a71b0378557a70af81f84ed1efbbb6ec93af298724909d750753010379d24d3