Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/07/2023, 07:19

General

  • Target

    BMTC PO Number - 11009810 Revised.exe

  • Size

    254KB

  • MD5

    607cca6a1cbfd2f8aa3b69515b706162

  • SHA1

    4a4e5053bed95e0638d21d529a0518270c6d05c6

  • SHA256

    86d4e06d459d993e94c995dc65bf75afbc4f91386ad7b10a1446bbb994c81d64

  • SHA512

    e8f6b92678a9346bc6ce4a120f6b612291305e30de9f2d0c8a9fefc85843a6e3362d7a03ea2e3e23bc9ef4072010cb99e3b7a11fa69d0c29952c374c6aebf09c

  • SSDEEP

    6144:PYa6J8qOUCO4EkeJ1Aa/zEUaaY417XcYYh6+:PYjIUCikAAa/4hUrI

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BMTC PO Number - 11009810 Revised.exe
    "C:\Users\Admin\AppData\Local\Temp\BMTC PO Number - 11009810 Revised.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1488
    • C:\Users\Admin\AppData\Local\Temp\BMTC PO Number - 11009810 Revised.exe
      "C:\Users\Admin\AppData\Local\Temp\BMTC PO Number - 11009810 Revised.exe"
      2⤵
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1972

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nsr7F05.tmp\colrab.dll

          Filesize

          11KB

          MD5

          21aef45f24a7921ba22d001853233d51

          SHA1

          9f55f9a4e17ef360eeb0537230e85c7dbf008d89

          SHA256

          44154d7171647bfce46e82e1f2bff980bbf16f900cfe46f94ea0c93e635fbcb4

          SHA512

          433b4e3d06966551ded13f233f30bdbb087847e489953d0d2fc113b2f16a4d8ef3053067759629d592bf125926f355c08b79229ec28e20912dbf49f78d308516

        • memory/1488-138-0x0000000074A30000-0x0000000074A36000-memory.dmp

          Filesize

          24KB

        • memory/1972-139-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1972-140-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB

        • memory/1972-141-0x00000000009D0000-0x0000000000D1A000-memory.dmp

          Filesize

          3.3MB

        • memory/1972-142-0x0000000000400000-0x0000000000430000-memory.dmp

          Filesize

          192KB