Resubmissions

08/07/2023, 17:02

230708-vkemzafh27 8

08/07/2023, 16:53

230708-vd57cagg21 8

Analysis

  • max time kernel
    153s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/07/2023, 16:53

General

  • Target

    Latex-Split-Table-Column.exe

  • Size

    300.4MB

  • MD5

    eff4dee32ca0f188b0f6ebe24799a489

  • SHA1

    d3980fba6bf04a63567954fa7ce8b645fc20367c

  • SHA256

    278ec8f7a0cd969ebb84e72f60f19bb6f6fd6f7268ebe68245c46e6de2a43cf1

  • SHA512

    d6665b744541124d5172348a3b035f14e06594a6a5e0655e69053189a9e5f801774d8580ca06dbf322e1ab698c77f94fa94fa4b4ee150f80981bbac429bf9650

  • SSDEEP

    49152:2OM9NlsVy2qjNdgk84444444444444444444444444444444444444444444444S:2f

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Latex-Split-Table-Column.exe
    "C:\Users\Admin\AppData\Local\Temp\Latex-Split-Table-Column.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4864
    • C:\Users\Admin\AppData\Local\Temp\dist13142.exe
      "C:\Users\Admin\AppData\Local\Temp\dist13142.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:888
      • C:\Users\Public\Documents\Wondershare\NFWCHK.exe
        C:\Users\Public\Documents\Wondershare\NFWCHK.exe
        3⤵
        • Executes dropped EXE
        PID:2676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_jswl1frg.ual.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\dist13142.exe

    Filesize

    1.6MB

    MD5

    3c932a548ae7eeb26348d9b948000f84

    SHA1

    f77cfdaec196517518f6601d1d0a6f558c8b5d53

    SHA256

    4e555b1b5102564811a8ecb229161201e4f11f79639a50fa70e3e9aae40973ee

    SHA512

    e4786a23902b6e738caf827962a6208d12e95f4e853d1dad50299267c80afb167055de72e4d060174220bed4ce8cc49b2d435f80631ce21c0fe68500d1372467

  • C:\Users\Admin\AppData\Local\Temp\dist13142.exe

    Filesize

    1.6MB

    MD5

    3c932a548ae7eeb26348d9b948000f84

    SHA1

    f77cfdaec196517518f6601d1d0a6f558c8b5d53

    SHA256

    4e555b1b5102564811a8ecb229161201e4f11f79639a50fa70e3e9aae40973ee

    SHA512

    e4786a23902b6e738caf827962a6208d12e95f4e853d1dad50299267c80afb167055de72e4d060174220bed4ce8cc49b2d435f80631ce21c0fe68500d1372467

  • C:\Users\Admin\AppData\Local\Temp\dist13142.exe

    Filesize

    1.6MB

    MD5

    3c932a548ae7eeb26348d9b948000f84

    SHA1

    f77cfdaec196517518f6601d1d0a6f558c8b5d53

    SHA256

    4e555b1b5102564811a8ecb229161201e4f11f79639a50fa70e3e9aae40973ee

    SHA512

    e4786a23902b6e738caf827962a6208d12e95f4e853d1dad50299267c80afb167055de72e4d060174220bed4ce8cc49b2d435f80631ce21c0fe68500d1372467

  • C:\Users\Admin\AppData\Local\Temp\wsWAE.log

    Filesize

    504B

    MD5

    42a0e6a804e88f20d532213eb2d69c58

    SHA1

    ad4b0bcd04a6857f73f3642b5f5a478682a43817

    SHA256

    315f8f9335a9b7c74e984189c2905d9ecda5fc77bce86811cfea5db71904b03b

    SHA512

    6c0b7475229eb67830f69968ba6bde3e9e8389544ee301115e9fab9d7fcf5257daf564b2a8eebd5b5a6bf4ad34245cfa798cf83fe17c84b574be1d88e123ffa0

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    1KB

    MD5

    04c9d7f844480cea744d83258f77a467

    SHA1

    af55422dac5fabbecdd898dfbf432e0febbf21c8

    SHA256

    4617d3cd33ffd266f9a543539d5c5560c0ff98805032693c589961a0af683b19

    SHA512

    ef4f8f69bfa4edf35bf5d935a4f69f84edca517631b9496dee4c701ab02a34fa3a383f9deda60e4361356e82d3c9879a3b4cd7b600f99af6530c9d99d9329511

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    1KB

    MD5

    04c9d7f844480cea744d83258f77a467

    SHA1

    af55422dac5fabbecdd898dfbf432e0febbf21c8

    SHA256

    4617d3cd33ffd266f9a543539d5c5560c0ff98805032693c589961a0af683b19

    SHA512

    ef4f8f69bfa4edf35bf5d935a4f69f84edca517631b9496dee4c701ab02a34fa3a383f9deda60e4361356e82d3c9879a3b4cd7b600f99af6530c9d99d9329511

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    1KB

    MD5

    04c9d7f844480cea744d83258f77a467

    SHA1

    af55422dac5fabbecdd898dfbf432e0febbf21c8

    SHA256

    4617d3cd33ffd266f9a543539d5c5560c0ff98805032693c589961a0af683b19

    SHA512

    ef4f8f69bfa4edf35bf5d935a4f69f84edca517631b9496dee4c701ab02a34fa3a383f9deda60e4361356e82d3c9879a3b4cd7b600f99af6530c9d99d9329511

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    2KB

    MD5

    9da0df0d06f0e5ddfa59923cb930a88d

    SHA1

    002d93109b880f7af985f91daa998d786e08a8ff

    SHA256

    23f98cb3d731932b4f712f9376829604921b9a4a24fcc12c00354e920ff5b8a1

    SHA512

    7c4c541ad8a93c166e533ba3feb4ef173d9d62e49a6835e266cfd3c4c3101675f23cfdc51e0bb9da55c3eed9b297d8d7aeb51d9a37a03d4015f813a35a62e986

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    6KB

    MD5

    a2faaa8bb6288ecba6d0d8a9693711be

    SHA1

    34ba05392b34902eae9a7b75d3b1f82cea43741f

    SHA256

    d17d91401b128d555d36afbf8e70ed466067503a7dd057d20879b7a32c0b706c

    SHA512

    39a37303bea79e42610c9a8cbb49b4304387fd5a5e40b007690f08746cf264c6042e1682a19100c61baefe4d24102c29d6ad14eb7694ced02873cc1575df59da

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe

    Filesize

    7KB

    MD5

    27cfb3990872caa5930fa69d57aefe7b

    SHA1

    5e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f

    SHA256

    43881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146

    SHA512

    a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe

    Filesize

    7KB

    MD5

    27cfb3990872caa5930fa69d57aefe7b

    SHA1

    5e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f

    SHA256

    43881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146

    SHA512

    a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe.config

    Filesize

    229B

    MD5

    ad0967a0ab95aa7d71b3dc92b71b8f7a

    SHA1

    ed63f517e32094c07a2c5b664ed1cab412233ab5

    SHA256

    9c1212bc648a2533b53a2d0afcec518846d97630afb013742a9622f0df7b04fc

    SHA512

    85766a907331f60044ec205cf345453fc3d44bfcac296ac93a12e8a752b84290dfd94f73b71de82f46f9503177d29602cbb87549f89dc61373d889b4ea26634b

  • memory/2676-1238-0x000000001C410000-0x000000001C459000-memory.dmp

    Filesize

    292KB

  • memory/2676-1239-0x000000001C4D0000-0x000000001C532000-memory.dmp

    Filesize

    392KB

  • memory/2676-1244-0x000000001D340000-0x000000001D37E000-memory.dmp

    Filesize

    248KB

  • memory/2676-1233-0x0000000000DE0000-0x0000000000DE8000-memory.dmp

    Filesize

    32KB

  • memory/2676-1234-0x000000001BBA0000-0x000000001BBC4000-memory.dmp

    Filesize

    144KB

  • memory/2676-1235-0x000000001BBF0000-0x000000001BC08000-memory.dmp

    Filesize

    96KB

  • memory/2676-1243-0x000000001C3A0000-0x000000001C3A8000-memory.dmp

    Filesize

    32KB

  • memory/2676-1236-0x000000001BC30000-0x000000001BC50000-memory.dmp

    Filesize

    128KB

  • memory/2676-1242-0x000000001CF80000-0x000000001D01C000-memory.dmp

    Filesize

    624KB

  • memory/2676-1237-0x000000001BC50000-0x000000001BF5E000-memory.dmp

    Filesize

    3.1MB

  • memory/2676-1240-0x0000000001210000-0x0000000001220000-memory.dmp

    Filesize

    64KB

  • memory/2676-1241-0x000000001CA10000-0x000000001CEDE000-memory.dmp

    Filesize

    4.8MB

  • memory/4864-144-0x0000000013720000-0x0000000013730000-memory.dmp

    Filesize

    64KB

  • memory/4864-133-0x0000000000360000-0x0000000001360000-memory.dmp

    Filesize

    16.0MB

  • memory/4864-143-0x000000002DAE0000-0x000000002DB02000-memory.dmp

    Filesize

    136KB

  • memory/4864-1248-0x0000000013720000-0x0000000013730000-memory.dmp

    Filesize

    64KB