Analysis

  • max time kernel
    143s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/09/2023, 18:32

General

  • Target

    cf6edaa1aa88714ae547b2f2592ca09b4f774b49dd19837d2d771c5687ed7001.exe

  • Size

    198KB

  • MD5

    ab5d4496a4c19763d7a640072914c8b5

  • SHA1

    fd0a126c057593ce62ad03405168c2e31f6abac2

  • SHA256

    cf6edaa1aa88714ae547b2f2592ca09b4f774b49dd19837d2d771c5687ed7001

  • SHA512

    20bb501b34a04f2dd4c4c70b5033ad93157f43bfb022cab7c56483f5cc58edb6e3feda52ce09d8a65461d7fef8c6b775d9961910108bfb206fdbb76e8cec6347

  • SSDEEP

    6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCO0:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXd

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cf6edaa1aa88714ae547b2f2592ca09b4f774b49dd19837d2d771c5687ed7001.exe
    "C:\Users\Admin\AppData\Local\Temp\cf6edaa1aa88714ae547b2f2592ca09b4f774b49dd19837d2d771c5687ed7001.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\CF6EDA~1.EXE > nul
      2⤵
        PID:3772
    • C:\Windows\Debug\bqchost.exe
      C:\Windows\Debug\bqchost.exe
      1⤵
      • Executes dropped EXE
      • Checks processor information in registry
      PID:5028

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\Debug\bqchost.exe

            Filesize

            198KB

            MD5

            2f151366ce6587932486acbdcbe07f92

            SHA1

            7b8e3fb9fa8e32138ce8225dfe633b3cb2a6b366

            SHA256

            9894cf46fb596ed867008ec8d59d57ae391bc8477cbc83c0d425e764c3d58de1

            SHA512

            7b2fce4411f77b2dc9383da54a0e59026cebd2d470cab1b805b5f31f58be413a6394af1f6fd7cce08aca156c6090d0b74a22cfd265c674cbfaae241d23ac7ab4

          • C:\Windows\debug\bqchost.exe

            Filesize

            198KB

            MD5

            2f151366ce6587932486acbdcbe07f92

            SHA1

            7b8e3fb9fa8e32138ce8225dfe633b3cb2a6b366

            SHA256

            9894cf46fb596ed867008ec8d59d57ae391bc8477cbc83c0d425e764c3d58de1

            SHA512

            7b2fce4411f77b2dc9383da54a0e59026cebd2d470cab1b805b5f31f58be413a6394af1f6fd7cce08aca156c6090d0b74a22cfd265c674cbfaae241d23ac7ab4