Analysis

  • max time kernel
    150s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/09/2023, 20:30

General

  • Target

    bf6b65610b30d30cf1809513c2a04fa1827ddc9d89cb6ee8c1bdbd96259711a2.exe

  • Size

    399KB

  • MD5

    7b3f7614fedcec2f47b38f3967f47aef

  • SHA1

    0d5b8f38c9c2a2aaffd8337839d64350c7acb41e

  • SHA256

    bf6b65610b30d30cf1809513c2a04fa1827ddc9d89cb6ee8c1bdbd96259711a2

  • SHA512

    12da78f689fd51819fc10fd4039b756bb89f37e87a1b4c678f2e278d81277fbf75e8fe4b981c7a1cd22ecc821259e4fdd6119dd8491b67b239c1b2a45e48f1b3

  • SSDEEP

    6144:qKiYJL+K7EQ5vrt5AVfL8haEK4sDzLPFocEOkCybEaQRXr9HNdvOa:WqEU0Vf4ha0sDzoOkx2LIa

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Unexpected DNS network traffic destination 2 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 26 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies data under HKEY_USERS 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 23 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:620
      • C:\Windows\Inf\xcopy.exe
        "C:\Windows\Inf\xcopy.exe"
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:920
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3184
      • C:\Users\Admin\AppData\Local\Temp\bf6b65610b30d30cf1809513c2a04fa1827ddc9d89cb6ee8c1bdbd96259711a2.exe
        "C:\Users\Admin\AppData\Local\Temp\bf6b65610b30d30cf1809513c2a04fa1827ddc9d89cb6ee8c1bdbd96259711a2.exe"
        2⤵
        • Checks computer location settings
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4780
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\bf6b65610b30d30cf1809513c2a04fa1827ddc9d89cb6ee8c1bdbd96259711a2.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1164
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 1
            4⤵
            • Delays execution with timeout.exe
            PID:208
    • C:\Windows\Syswow64\1980d59
      C:\Windows\Syswow64\1980d59
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1388
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Windows\Syswow64\1980d59"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4616
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 1
          3⤵
          • Delays execution with timeout.exe
          PID:3804

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\835522fa.tmp

            Filesize

            14.5MB

            MD5

            6697f78c0dffa2e0b851046aaf272101

            SHA1

            b91aeb9e6d4d99778a4fe27da2457cdb321e8bfe

            SHA256

            354b9545fbb292faea96eadbef7c85caf0f6f72b915e567044833fdfc2b923f0

            SHA512

            fd5d44c6aa0c791e77bfec1436e810b1ef6cd1c92937faa060b6688b5dd4a47268189639e628e2fed8ce57ad04b0e816f18b16d2a3e69e60cbd16049948766d4

          • C:\Windows\INF\xcopy.exe

            Filesize

            49KB

            MD5

            39fbfd3af58238c6f9d4d408c9251ff5

            SHA1

            c5bd7815ed18f7e3d1ce93cc47aecf58d908dca8

            SHA256

            269eb0728413654856f4b2ee1fa7838cd69672ebc11baed4caa63f58c2df5823

            SHA512

            b1cf7952f4c5d049c6bf076a34aba5789833ef208c3e8ab1de300d96c9e7ffcfd13e0b458ff608105395b57cec7fe0f2dd240c942e9e727e13bf5686c752e336

          • C:\Windows\Inf\xcopy.exe

            Filesize

            49KB

            MD5

            39fbfd3af58238c6f9d4d408c9251ff5

            SHA1

            c5bd7815ed18f7e3d1ce93cc47aecf58d908dca8

            SHA256

            269eb0728413654856f4b2ee1fa7838cd69672ebc11baed4caa63f58c2df5823

            SHA512

            b1cf7952f4c5d049c6bf076a34aba5789833ef208c3e8ab1de300d96c9e7ffcfd13e0b458ff608105395b57cec7fe0f2dd240c942e9e727e13bf5686c752e336

          • C:\Windows\SysWOW64\1980d59

            Filesize

            399KB

            MD5

            d0c59d5efe234ab425e0f6f8b852caf3

            SHA1

            9579606bb2c4e6146b5d62eea02ad63f0c5e3a89

            SHA256

            fc04c0fa8efaf79016a0109190b62bd0d8a9db472ddac50331afe3af8824eee1

            SHA512

            db95e030d0fca83b239519308bfec32e626b3abefab29c4ff7a72de73962ace898766a4b4cd7f7fd6cf9d3060e0015419e44b63819ff158e0c9c151f6f315555

          • C:\Windows\SysWOW64\1980d59

            Filesize

            399KB

            MD5

            d0c59d5efe234ab425e0f6f8b852caf3

            SHA1

            9579606bb2c4e6146b5d62eea02ad63f0c5e3a89

            SHA256

            fc04c0fa8efaf79016a0109190b62bd0d8a9db472ddac50331afe3af8824eee1

            SHA512

            db95e030d0fca83b239519308bfec32e626b3abefab29c4ff7a72de73962ace898766a4b4cd7f7fd6cf9d3060e0015419e44b63819ff158e0c9c151f6f315555

          • memory/620-33-0x0000023CC6790000-0x0000023CC67B8000-memory.dmp

            Filesize

            160KB

          • memory/620-31-0x0000023CC6780000-0x0000023CC6783000-memory.dmp

            Filesize

            12KB

          • memory/920-67-0x0000020082F30000-0x0000020082F32000-memory.dmp

            Filesize

            8KB

          • memory/920-71-0x00000200833B0000-0x00000200833B1000-memory.dmp

            Filesize

            4KB

          • memory/920-29-0x00007FF9C1070000-0x00007FF9C1080000-memory.dmp

            Filesize

            64KB

          • memory/920-27-0x0000020081490000-0x000002008155B000-memory.dmp

            Filesize

            812KB

          • memory/920-25-0x00000200811F0000-0x00000200811F3000-memory.dmp

            Filesize

            12KB

          • memory/920-82-0x0000020083B60000-0x0000020083B62000-memory.dmp

            Filesize

            8KB

          • memory/920-81-0x0000020083D30000-0x0000020083EF5000-memory.dmp

            Filesize

            1.8MB

          • memory/920-65-0x00007FF9C1070000-0x00007FF9C1080000-memory.dmp

            Filesize

            64KB

          • memory/920-79-0x0000020083C80000-0x0000020083C81000-memory.dmp

            Filesize

            4KB

          • memory/920-78-0x00000200833B0000-0x00000200833B1000-memory.dmp

            Filesize

            4KB

          • memory/920-68-0x0000020081490000-0x000002008155B000-memory.dmp

            Filesize

            812KB

          • memory/920-69-0x0000020081490000-0x000002008155B000-memory.dmp

            Filesize

            812KB

          • memory/920-70-0x00000200833A0000-0x00000200833A1000-memory.dmp

            Filesize

            4KB

          • memory/920-26-0x0000020081490000-0x000002008155B000-memory.dmp

            Filesize

            812KB

          • memory/920-72-0x00000200833B0000-0x00000200833B1000-memory.dmp

            Filesize

            4KB

          • memory/920-73-0x00000200833A0000-0x00000200833A1000-memory.dmp

            Filesize

            4KB

          • memory/920-74-0x0000020083D30000-0x0000020083EF5000-memory.dmp

            Filesize

            1.8MB

          • memory/920-76-0x0000020083B60000-0x0000020083B62000-memory.dmp

            Filesize

            8KB

          • memory/920-75-0x00000200833A0000-0x00000200833A1000-memory.dmp

            Filesize

            4KB

          • memory/920-77-0x0000020083C80000-0x0000020083C81000-memory.dmp

            Filesize

            4KB

          • memory/3184-20-0x00000000026B0000-0x00000000027A9000-memory.dmp

            Filesize

            996KB

          • memory/3184-66-0x00000000026B0000-0x00000000027A9000-memory.dmp

            Filesize

            996KB

          • memory/3184-17-0x0000000000590000-0x0000000000593000-memory.dmp

            Filesize

            12KB

          • memory/3184-18-0x0000000000590000-0x0000000000593000-memory.dmp

            Filesize

            12KB

          • memory/3184-23-0x00000000026B0000-0x00000000027A9000-memory.dmp

            Filesize

            996KB

          • memory/3184-15-0x0000000000590000-0x0000000000593000-memory.dmp

            Filesize

            12KB