Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/07/2023, 09:54

General

  • Target

    5a13091832ef2fd837c33acb44b97c37d4f1f412f31f093faf0ce83dcd7c314e.exe

  • Size

    203KB

  • MD5

    d209d42e2d604e6018129634fc2a2f38

  • SHA1

    931d1ab97dba24013e97ee6a9247e70b0bf0ef13

  • SHA256

    5a13091832ef2fd837c33acb44b97c37d4f1f412f31f093faf0ce83dcd7c314e

  • SHA512

    269b0822e8160693046f30539db2ff96281f004ad37356d16aba34d5eda122dc9a0684bc414724bf90acce484b767a0dce9b4ee590eb4e620c4a7d36f964d2ef

  • SSDEEP

    6144:Dz1xOecgEnOxUwWz1w4mcH+dZvF4lBFusBQW:31seJzWz1l+LIb

Score
8/10
upx

Malware Config

Signatures

  • Blocklisted process makes network request 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a13091832ef2fd837c33acb44b97c37d4f1f412f31f093faf0ce83dcd7c314e.exe
    "C:\Users\Admin\AppData\Local\Temp\5a13091832ef2fd837c33acb44b97c37d4f1f412f31f093faf0ce83dcd7c314e.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1388
    • C:\Windows\SysWOW64\PackagedCWALauncher.exe
      "C:\Windows\SysWOW64\PackagedCWALauncher.exe"
      2⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4932
      • C:\Windows\SysWOW64\cscript.exe
        "C:\Windows\SysWOW64\cscript.exe"
        3⤵
        • Blocklisted process makes network request
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2388
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\5A1309~1.EXE > nul
      2⤵
        PID:3764

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\WindowRedSystem21.log

      Filesize

      5KB

      MD5

      3277beefd3914319ac2e0e069ced5ce5

      SHA1

      f9795784e4dcd3b64d1808a0e491b6ff77e4ef60

      SHA256

      8aad6e35a45e55ebb143feba595a55cdec37e9c27f821ca818f8ae4a4778a261

      SHA512

      a3d9f232acead641bae93e6e31aaab9e3e4f169c975adbb8297549d711056c2082025b9671aa30a68f1fb896d3403ebe260b6d4af10a0dcc48f0287e6885d1ff

    • C:\Windows\WindowSystemNewUpdate12.log

      Filesize

      4KB

      MD5

      88921a5e2ba77c0ab353969c7a8b32f3

      SHA1

      ae3cd89c31f885a2d7ee494c8dee314436285718

      SHA256

      d65f56108c6849e044b429535b7f8ccc243d21b813b0ed8006b313affe390b38

      SHA512

      8a88fe3a31a5aa230d6d771bcab5c68021d22bb507eca7fffcd2427eda712c7fcbb4aaff04d20d54e0a02fca3de844737a85ffd76a53d0138b93d4fad2cc5aed

    • memory/1388-153-0x0000000000970000-0x0000000000A07000-memory.dmp

      Filesize

      604KB

    • memory/1388-133-0x0000000000970000-0x0000000000A07000-memory.dmp

      Filesize

      604KB

    • memory/2388-260-0x0000000010000000-0x0000000010444000-memory.dmp

      Filesize

      4.3MB

    • memory/2388-246-0x0000000000C30000-0x0000000000C4B000-memory.dmp

      Filesize

      108KB

    • memory/2388-313-0x0000000010000000-0x0000000010444000-memory.dmp

      Filesize

      4.3MB

    • memory/2388-308-0x0000000010000000-0x0000000010444000-memory.dmp

      Filesize

      4.3MB

    • memory/2388-247-0x0000000010000000-0x0000000010444000-memory.dmp

      Filesize

      4.3MB

    • memory/2388-261-0x0000000010000000-0x0000000010444000-memory.dmp

      Filesize

      4.3MB

    • memory/2388-249-0x0000000010000000-0x0000000010444000-memory.dmp

      Filesize

      4.3MB

    • memory/2388-248-0x0000000010000000-0x0000000010444000-memory.dmp

      Filesize

      4.3MB

    • memory/2388-263-0x0000000010000000-0x0000000010444000-memory.dmp

      Filesize

      4.3MB

    • memory/2388-242-0x0000000010000000-0x0000000010444000-memory.dmp

      Filesize

      4.3MB

    • memory/2388-223-0x0000000000600000-0x0000000000A51000-memory.dmp

      Filesize

      4.3MB

    • memory/2388-224-0x0000000000C30000-0x0000000000C4B000-memory.dmp

      Filesize

      108KB

    • memory/2388-227-0x0000000000C30000-0x0000000000C4B000-memory.dmp

      Filesize

      108KB

    • memory/2388-231-0x0000000010000000-0x0000000010444000-memory.dmp

      Filesize

      4.3MB

    • memory/2388-241-0x0000000010000000-0x0000000010444000-memory.dmp

      Filesize

      4.3MB

    • memory/2388-244-0x0000000010000000-0x0000000010444000-memory.dmp

      Filesize

      4.3MB

    • memory/4932-141-0x0000000010000000-0x0000000010057000-memory.dmp

      Filesize

      348KB

    • memory/4932-259-0x0000000003720000-0x0000000003819000-memory.dmp

      Filesize

      996KB

    • memory/4932-183-0x0000000001300000-0x0000000001338000-memory.dmp

      Filesize

      224KB

    • memory/4932-192-0x0000000004340000-0x0000000004671000-memory.dmp

      Filesize

      3.2MB

    • memory/4932-179-0x0000000003720000-0x0000000003819000-memory.dmp

      Filesize

      996KB

    • memory/4932-251-0x0000000003720000-0x0000000003819000-memory.dmp

      Filesize

      996KB

    • memory/4932-254-0x0000000003720000-0x0000000003819000-memory.dmp

      Filesize

      996KB

    • memory/4932-255-0x0000000003720000-0x0000000003819000-memory.dmp

      Filesize

      996KB

    • memory/4932-257-0x0000000003720000-0x0000000003819000-memory.dmp

      Filesize

      996KB

    • memory/4932-204-0x0000000003720000-0x0000000003819000-memory.dmp

      Filesize

      996KB

    • memory/4932-139-0x0000000001660000-0x000000000167B000-memory.dmp

      Filesize

      108KB

    • memory/4932-177-0x0000000003720000-0x0000000003819000-memory.dmp

      Filesize

      996KB

    • memory/4932-175-0x0000000003720000-0x0000000003819000-memory.dmp

      Filesize

      996KB

    • memory/4932-167-0x0000000003720000-0x0000000003819000-memory.dmp

      Filesize

      996KB

    • memory/4932-140-0x0000000001660000-0x000000000167B000-memory.dmp

      Filesize

      108KB

    • memory/4932-137-0x0000000001660000-0x000000000167B000-memory.dmp

      Filesize

      108KB

    • memory/4932-135-0x0000000000F90000-0x0000000000FF7000-memory.dmp

      Filesize

      412KB

    • memory/4932-365-0x0000000007060000-0x00000000073E3000-memory.dmp

      Filesize

      3.5MB

    • memory/4932-366-0x0000000007060000-0x00000000073E3000-memory.dmp

      Filesize

      3.5MB

    • memory/4932-377-0x0000000007060000-0x00000000073E3000-memory.dmp

      Filesize

      3.5MB