Analysis

  • max time kernel
    156s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/07/2023, 10:53

General

  • Target

    Latex-Split-Table-Column.exe

  • Size

    300.4MB

  • MD5

    eff4dee32ca0f188b0f6ebe24799a489

  • SHA1

    d3980fba6bf04a63567954fa7ce8b645fc20367c

  • SHA256

    278ec8f7a0cd969ebb84e72f60f19bb6f6fd6f7268ebe68245c46e6de2a43cf1

  • SHA512

    d6665b744541124d5172348a3b035f14e06594a6a5e0655e69053189a9e5f801774d8580ca06dbf322e1ab698c77f94fa94fa4b4ee150f80981bbac429bf9650

  • SSDEEP

    49152:2OM9NlsVy2qjNdgk84444444444444444444444444444444444444444444444S:2f

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Latex-Split-Table-Column.exe
    "C:\Users\Admin\AppData\Local\Temp\Latex-Split-Table-Column.exe"
    1⤵
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Users\Admin\AppData\Local\Temp\dist13142.exe
      "C:\Users\Admin\AppData\Local\Temp\dist13142.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1872
      • C:\Users\Public\Documents\Wondershare\NFWCHK.exe
        C:\Users\Public\Documents\Wondershare\NFWCHK.exe
        3⤵
        • Executes dropped EXE
        PID:2204

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_rx2y1fy3.u1w.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • C:\Users\Admin\AppData\Local\Temp\dist13142.exe

    Filesize

    1.6MB

    MD5

    3c932a548ae7eeb26348d9b948000f84

    SHA1

    f77cfdaec196517518f6601d1d0a6f558c8b5d53

    SHA256

    4e555b1b5102564811a8ecb229161201e4f11f79639a50fa70e3e9aae40973ee

    SHA512

    e4786a23902b6e738caf827962a6208d12e95f4e853d1dad50299267c80afb167055de72e4d060174220bed4ce8cc49b2d435f80631ce21c0fe68500d1372467

  • C:\Users\Admin\AppData\Local\Temp\dist13142.exe

    Filesize

    1.6MB

    MD5

    3c932a548ae7eeb26348d9b948000f84

    SHA1

    f77cfdaec196517518f6601d1d0a6f558c8b5d53

    SHA256

    4e555b1b5102564811a8ecb229161201e4f11f79639a50fa70e3e9aae40973ee

    SHA512

    e4786a23902b6e738caf827962a6208d12e95f4e853d1dad50299267c80afb167055de72e4d060174220bed4ce8cc49b2d435f80631ce21c0fe68500d1372467

  • C:\Users\Admin\AppData\Local\Temp\dist13142.exe

    Filesize

    1.6MB

    MD5

    3c932a548ae7eeb26348d9b948000f84

    SHA1

    f77cfdaec196517518f6601d1d0a6f558c8b5d53

    SHA256

    4e555b1b5102564811a8ecb229161201e4f11f79639a50fa70e3e9aae40973ee

    SHA512

    e4786a23902b6e738caf827962a6208d12e95f4e853d1dad50299267c80afb167055de72e4d060174220bed4ce8cc49b2d435f80631ce21c0fe68500d1372467

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    1KB

    MD5

    60e743bc71f1d39757d9f3587587c1eb

    SHA1

    e5aefc44e05a4bdc43d3250452365262241d89b0

    SHA256

    2d6bc7a828b9676d4e986c554e3024e260ad1d644a63ca1a2559ad2cbf3985cd

    SHA512

    071c3a7f9a68e84d1e3bd49e62c1c854edf1b56ba679345b20a755582b36615e1240c9d9d05d1bd0ac8d18f819d631907b18bdb9e3579764cf1d1d3bb3c354e7

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    1KB

    MD5

    e5b5bfc43bf90b846f846e435f45403d

    SHA1

    b0eafba495fa151ae9492572a69a61be828c302d

    SHA256

    a1813202895365d3364af50c97e5c594ed7c5482926e3ef78767be2defecfe4b

    SHA512

    23087748d20b610632ea046f5597a12d5dd79dd458ccd09d13e89ed5ce41bcd2a98ab1ffd6a42754c44abffc69da7899c08209cfffdbaf32aee5dee2c48a4e12

  • C:\Users\Admin\AppData\Local\Temp\wsduilib.log

    Filesize

    10KB

    MD5

    34d9559b46614a6ca272205a3b3f51bd

    SHA1

    2085856c9cedc8500ab2577b3ba21b4977294c47

    SHA256

    f77c48a7d4bfc9f2414a434c1a9c53940f590c19827c3ef808e6a658b9d0dc8a

    SHA512

    b185d6824efeffb019db01329061a8e12b645fda78f2d024ade120db35e6ca27754c76f649ed80fcc3255b892613645068d6c68686be4074400b7509c6247fd0

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe

    Filesize

    7KB

    MD5

    27cfb3990872caa5930fa69d57aefe7b

    SHA1

    5e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f

    SHA256

    43881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146

    SHA512

    a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe

    Filesize

    7KB

    MD5

    27cfb3990872caa5930fa69d57aefe7b

    SHA1

    5e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f

    SHA256

    43881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146

    SHA512

    a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a

  • C:\Users\Public\Documents\Wondershare\NFWCHK.exe.config

    Filesize

    229B

    MD5

    ad0967a0ab95aa7d71b3dc92b71b8f7a

    SHA1

    ed63f517e32094c07a2c5b664ed1cab412233ab5

    SHA256

    9c1212bc648a2533b53a2d0afcec518846d97630afb013742a9622f0df7b04fc

    SHA512

    85766a907331f60044ec205cf345453fc3d44bfcac296ac93a12e8a752b84290dfd94f73b71de82f46f9503177d29602cbb87549f89dc61373d889b4ea26634b

  • memory/2204-1238-0x000000001B6B0000-0x000000001B9BE000-memory.dmp

    Filesize

    3.1MB

  • memory/2204-1239-0x000000001BE70000-0x000000001BEB9000-memory.dmp

    Filesize

    292KB

  • memory/2204-1244-0x000000001CDB0000-0x000000001CDEE000-memory.dmp

    Filesize

    248KB

  • memory/2204-1233-0x0000000000840000-0x0000000000848000-memory.dmp

    Filesize

    32KB

  • memory/2204-1234-0x000000001B600000-0x000000001B624000-memory.dmp

    Filesize

    144KB

  • memory/2204-1235-0x000000001B650000-0x000000001B668000-memory.dmp

    Filesize

    96KB

  • memory/2204-1243-0x000000001BE00000-0x000000001BE08000-memory.dmp

    Filesize

    32KB

  • memory/2204-1236-0x000000001B690000-0x000000001B6B0000-memory.dmp

    Filesize

    128KB

  • memory/2204-1242-0x000000001C9E0000-0x000000001CA7C000-memory.dmp

    Filesize

    624KB

  • memory/2204-1237-0x00000000010D0000-0x00000000010E0000-memory.dmp

    Filesize

    64KB

  • memory/2204-1240-0x000000001BF30000-0x000000001BF92000-memory.dmp

    Filesize

    392KB

  • memory/2204-1241-0x000000001C470000-0x000000001C93E000-memory.dmp

    Filesize

    4.8MB

  • memory/3440-144-0x0000000013D20000-0x0000000013D42000-memory.dmp

    Filesize

    136KB

  • memory/3440-143-0x0000000013D50000-0x0000000013D60000-memory.dmp

    Filesize

    64KB

  • memory/3440-133-0x0000000000760000-0x0000000001760000-memory.dmp

    Filesize

    16.0MB

  • memory/3440-1248-0x0000000013D50000-0x0000000013D60000-memory.dmp

    Filesize

    64KB