Analysis

  • max time kernel
    146s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/07/2023, 13:12

General

  • Target

    NA_NA_3c9b74f66f1e8fexeexe_JC.exe

  • Size

    327KB

  • MD5

    3c9b74f66f1e8f4e606fb917c4edd3be

  • SHA1

    8c398a0bf7465205adbddfa9d3dd07af145ec03f

  • SHA256

    986849ad807ec4c2e195c84c2aac0e95171a709b87147e0cd3494d2aafc5edcc

  • SHA512

    d4bacadde5dc9d00de7ba1f6ecae70fef58de6e1dede7e8b8f8bc822ef27730d43783f313c236bbbe0f1fa18ef54c7e399aa8907e7c64bdfc98c6846fb9c07c3

  • SSDEEP

    6144:fJ2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG89gkPzDh1v:fJ2TFafJiHCWBWPMjVWrXf1v

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\NA_NA_3c9b74f66f1e8fexeexe_JC.exe
    "C:\Users\Admin\AppData\Local\Temp\NA_NA_3c9b74f66f1e8fexeexe_JC.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4292
    • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:544
      • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe"
        3⤵
        • Executes dropped EXE
        PID:1308

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe

    Filesize

    327KB

    MD5

    187855db61f62d845e7e34c30766eb29

    SHA1

    2946e54d0ecb8b655784e36307c22d585970fcff

    SHA256

    042e07ddf978b2f3371533f58635ef1b119ee61cecd6c3ace90deb38cb001743

    SHA512

    a4a6b1e3616c88ba4ebc1fb3150af7f616f6cfaed1e09a478dcd3d91c7eaa91bcc38856ece6787d62a1409b87a90fcce49456fc49f735a7312c0aad691ebe25d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe

    Filesize

    327KB

    MD5

    187855db61f62d845e7e34c30766eb29

    SHA1

    2946e54d0ecb8b655784e36307c22d585970fcff

    SHA256

    042e07ddf978b2f3371533f58635ef1b119ee61cecd6c3ace90deb38cb001743

    SHA512

    a4a6b1e3616c88ba4ebc1fb3150af7f616f6cfaed1e09a478dcd3d91c7eaa91bcc38856ece6787d62a1409b87a90fcce49456fc49f735a7312c0aad691ebe25d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe

    Filesize

    327KB

    MD5

    187855db61f62d845e7e34c30766eb29

    SHA1

    2946e54d0ecb8b655784e36307c22d585970fcff

    SHA256

    042e07ddf978b2f3371533f58635ef1b119ee61cecd6c3ace90deb38cb001743

    SHA512

    a4a6b1e3616c88ba4ebc1fb3150af7f616f6cfaed1e09a478dcd3d91c7eaa91bcc38856ece6787d62a1409b87a90fcce49456fc49f735a7312c0aad691ebe25d

  • C:\Users\Admin\AppData\Roaming\Microsoft\Posix\csrssys.exe

    Filesize

    327KB

    MD5

    187855db61f62d845e7e34c30766eb29

    SHA1

    2946e54d0ecb8b655784e36307c22d585970fcff

    SHA256

    042e07ddf978b2f3371533f58635ef1b119ee61cecd6c3ace90deb38cb001743

    SHA512

    a4a6b1e3616c88ba4ebc1fb3150af7f616f6cfaed1e09a478dcd3d91c7eaa91bcc38856ece6787d62a1409b87a90fcce49456fc49f735a7312c0aad691ebe25d