Analysis

  • max time kernel
    151s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04/10/2023, 08:48

General

  • Target

    2e07e1dde020eee00a69fbb959fc5620a3e08c63f48b74d9270b4aa4a5f93584.exe

  • Size

    1.1MB

  • MD5

    d5fc28331a65ffe0aa7aa890bef964ab

  • SHA1

    e78035e69dfd105195d3e0cce2ded119b75e3661

  • SHA256

    2e07e1dde020eee00a69fbb959fc5620a3e08c63f48b74d9270b4aa4a5f93584

  • SHA512

    27ae56969317d5bd09a873cb07731684109a73d09d755cafc8b0d915245c057fe94730acd1066983547738eca0ee82dd3f583fdfcf592fb26d26646bf7cadcb4

  • SSDEEP

    6144:dl51orRJXlDixHkUXe34cEOkCybEaQRXr9HNdvOa51BgVWWStmyyye/:bqXUHkUXe3GOkx2LIazBg0tmyyyI

Score
10/10
upx

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Downloads MZ/PE file
  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Unexpected DNS network traffic destination 1 IoCs

    Network traffic to other servers than the configured DNS servers was detected on the DNS port.

  • Drops file in System32 directory 32 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 2 IoCs
  • Modifies data under HKEY_USERS 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: LoadsDriver 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 39 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:608
      • C:\Program Files\Common Files\pcalua.exe
        "C:\Program Files\Common Files\pcalua.exe"
        2⤵
        • Drops file in Drivers directory
        • Executes dropped EXE
        • Drops file in System32 directory
        • Drops file in Windows directory
        • Checks SCSI registry key(s)
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4116
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of UnmapMainImage
      • Suspicious use of WriteProcessMemory
      PID:3204
      • C:\Users\Admin\AppData\Local\Temp\2e07e1dde020eee00a69fbb959fc5620a3e08c63f48b74d9270b4aa4a5f93584.exe
        "C:\Users\Admin\AppData\Local\Temp\2e07e1dde020eee00a69fbb959fc5620a3e08c63f48b74d9270b4aa4a5f93584.exe"
        2⤵
        • Checks computer location settings
        • Drops file in System32 directory
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\2e07e1dde020eee00a69fbb959fc5620a3e08c63f48b74d9270b4aa4a5f93584.exe"
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:4388
          • C:\Windows\SysWOW64\timeout.exe
            timeout /t 1
            4⤵
            • Delays execution with timeout.exe
            PID:3652
    • C:\Windows\Syswow64\4df8a253
      C:\Windows\Syswow64\4df8a253
      1⤵
      • Executes dropped EXE
      • Drops file in System32 directory
      • Drops file in Windows directory
      • Modifies data under HKEY_USERS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Windows\Syswow64\4df8a253"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3340
        • C:\Windows\SysWOW64\timeout.exe
          timeout /t 1
          3⤵
          • Delays execution with timeout.exe
          PID:3612

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Common Files\pcalua.exe

      Filesize

      52KB

      MD5

      5f7cde105e9679ff88b3b6a3dcd129db

      SHA1

      b9193c196201b9411bb917122f93e19238caa1bb

      SHA256

      1d528a686a583162794349114f945a8bd2b17321f6fa62288cd1ce3ec48d2447

      SHA512

      66a606a5d2ce3e19f06c0fe5b842d9c51ac1e9b02c49655c3cb5280dc27e192cd256f4f40ba4fc5dead026524626f1242acf79c434e74a2f54e5770ffd0b9ffe

    • C:\Program Files\Common Files\pcalua.exe

      Filesize

      52KB

      MD5

      5f7cde105e9679ff88b3b6a3dcd129db

      SHA1

      b9193c196201b9411bb917122f93e19238caa1bb

      SHA256

      1d528a686a583162794349114f945a8bd2b17321f6fa62288cd1ce3ec48d2447

      SHA512

      66a606a5d2ce3e19f06c0fe5b842d9c51ac1e9b02c49655c3cb5280dc27e192cd256f4f40ba4fc5dead026524626f1242acf79c434e74a2f54e5770ffd0b9ffe

    • C:\Users\Admin\AppData\Local\Temp\835a42b1.tmp

      Filesize

      11.6MB

      MD5

      5244c87dbafa1f764b258766005dea73

      SHA1

      84cb8b4fb3e0910cfecfb31b6fa54c16d940e703

      SHA256

      077035f93ddc3ac5a8b5631d43826baf7722256eb1c4716b3c2567f07379bc40

      SHA512

      54d64d32e73e2752cdf9a110db17ad64574eb072df0ed0dc34a7e4bc469c03aa79ef7d45465e279ef85d5fc6b33a1b750b181476cdea7ea98898ddba9aa60438

    • C:\Windows\SysWOW64\4df8a253

      Filesize

      1.1MB

      MD5

      05caec7786401f365cd4d49905ee89f9

      SHA1

      4bcdc88a39d697ae0ef204123f09566f9ab6f860

      SHA256

      bfd7fab58ad84d366775a519fc26b17ca00bcc79542066d837c4ed837a625f20

      SHA512

      af812fa23feb1b049b96f44563b97b3067248785d4c02717500b1e684fb82b7aa6c5bf690111f8eb684d3912992e577c6aea6a3089745507f5c034a14ad8c5f8

    • C:\Windows\SysWOW64\4df8a253

      Filesize

      1.1MB

      MD5

      05caec7786401f365cd4d49905ee89f9

      SHA1

      4bcdc88a39d697ae0ef204123f09566f9ab6f860

      SHA256

      bfd7fab58ad84d366775a519fc26b17ca00bcc79542066d837c4ed837a625f20

      SHA512

      af812fa23feb1b049b96f44563b97b3067248785d4c02717500b1e684fb82b7aa6c5bf690111f8eb684d3912992e577c6aea6a3089745507f5c034a14ad8c5f8

    • memory/608-79-0x000002E9EE600000-0x000002E9EE601000-memory.dmp

      Filesize

      4KB

    • memory/608-29-0x000002E9EE5B0000-0x000002E9EE5B3000-memory.dmp

      Filesize

      12KB

    • memory/608-32-0x000002E9EE600000-0x000002E9EE601000-memory.dmp

      Filesize

      4KB

    • memory/608-73-0x000002E9EE5C0000-0x000002E9EE5E8000-memory.dmp

      Filesize

      160KB

    • memory/608-31-0x000002E9EE5C0000-0x000002E9EE5E8000-memory.dmp

      Filesize

      160KB

    • memory/1556-16-0x0000000000E10000-0x0000000000E99000-memory.dmp

      Filesize

      548KB

    • memory/1556-14-0x0000000000E10000-0x0000000000E99000-memory.dmp

      Filesize

      548KB

    • memory/1556-70-0x0000000000E10000-0x0000000000E99000-memory.dmp

      Filesize

      548KB

    • memory/1556-3-0x0000000000E10000-0x0000000000E99000-memory.dmp

      Filesize

      548KB

    • memory/3008-0-0x0000000000270000-0x00000000002F9000-memory.dmp

      Filesize

      548KB

    • memory/3008-39-0x0000000000270000-0x00000000002F9000-memory.dmp

      Filesize

      548KB

    • memory/3008-8-0x0000000000270000-0x00000000002F9000-memory.dmp

      Filesize

      548KB

    • memory/3204-102-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-158-0x0000000002FB0000-0x0000000002FC0000-memory.dmp

      Filesize

      64KB

    • memory/3204-212-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-47-0x0000000008E00000-0x0000000008E01000-memory.dmp

      Filesize

      4KB

    • memory/3204-48-0x00000000093E0000-0x00000000094D9000-memory.dmp

      Filesize

      996KB

    • memory/3204-210-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-208-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-206-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-195-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-192-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-72-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-185-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-76-0x0000000008DD0000-0x0000000008DE0000-memory.dmp

      Filesize

      64KB

    • memory/3204-75-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-74-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-77-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-18-0x00000000093E0000-0x00000000094D9000-memory.dmp

      Filesize

      996KB

    • memory/3204-78-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-80-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-81-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-83-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-85-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-86-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-183-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-88-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-89-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-90-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-92-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-94-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-95-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-96-0x0000000008DD0000-0x0000000008DE0000-memory.dmp

      Filesize

      64KB

    • memory/3204-97-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-99-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-101-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-105-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-103-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-104-0x0000000008E00000-0x0000000008E10000-memory.dmp

      Filesize

      64KB

    • memory/3204-17-0x0000000008E00000-0x0000000008E01000-memory.dmp

      Filesize

      4KB

    • memory/3204-100-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-98-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-106-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-181-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-178-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-175-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-174-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-169-0x0000000002FB0000-0x0000000002FC0000-memory.dmp

      Filesize

      64KB

    • memory/3204-112-0x0000000008E00000-0x0000000008E10000-memory.dmp

      Filesize

      64KB

    • memory/3204-170-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-168-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-167-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-165-0x0000000002FA0000-0x0000000002FB0000-memory.dmp

      Filesize

      64KB

    • memory/3204-166-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-164-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-15-0x00000000036E0000-0x00000000036E3000-memory.dmp

      Filesize

      12KB

    • memory/3204-163-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-12-0x00000000036E0000-0x00000000036E3000-memory.dmp

      Filesize

      12KB

    • memory/3204-144-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-145-0x0000000002FA0000-0x0000000002FB0000-memory.dmp

      Filesize

      64KB

    • memory/3204-143-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-142-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-147-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-146-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-149-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-153-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-154-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-151-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-148-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-155-0x0000000002FB0000-0x0000000002FC0000-memory.dmp

      Filesize

      64KB

    • memory/3204-156-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-157-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-161-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/3204-159-0x0000000008DC0000-0x0000000008DD0000-memory.dmp

      Filesize

      64KB

    • memory/4116-109-0x00000249B4AF0000-0x00000249B4AF1000-memory.dmp

      Filesize

      4KB

    • memory/4116-108-0x00000249B4AE0000-0x00000249B4AE1000-memory.dmp

      Filesize

      4KB

    • memory/4116-118-0x00000249B4AF0000-0x00000249B4AF1000-memory.dmp

      Filesize

      4KB

    • memory/4116-117-0x00000249B53C0000-0x00000249B53C1000-memory.dmp

      Filesize

      4KB

    • memory/4116-116-0x00000249B53C0000-0x00000249B53C1000-memory.dmp

      Filesize

      4KB

    • memory/4116-115-0x00000249B4AE0000-0x00000249B4AE1000-memory.dmp

      Filesize

      4KB

    • memory/4116-114-0x00000249B52A0000-0x00000249B52A2000-memory.dmp

      Filesize

      8KB

    • memory/4116-113-0x00000249B5470000-0x00000249B5635000-memory.dmp

      Filesize

      1.8MB

    • memory/4116-111-0x00000249B4AE0000-0x00000249B4AE1000-memory.dmp

      Filesize

      4KB

    • memory/4116-110-0x00000249B4AE0000-0x00000249B4AE1000-memory.dmp

      Filesize

      4KB

    • memory/4116-120-0x00000249B5470000-0x00000249B5635000-memory.dmp

      Filesize

      1.8MB

    • memory/4116-107-0x00000249B4AE0000-0x00000249B4AE1000-memory.dmp

      Filesize

      4KB

    • memory/4116-27-0x00000249B2A70000-0x00000249B2A80000-memory.dmp

      Filesize

      64KB

    • memory/4116-87-0x00000249B4AD0000-0x00000249B4AD1000-memory.dmp

      Filesize

      4KB

    • memory/4116-25-0x00000249B4370000-0x00000249B443B000-memory.dmp

      Filesize

      812KB

    • memory/4116-71-0x00000249B2A70000-0x00000249B2A80000-memory.dmp

      Filesize

      64KB

    • memory/4116-23-0x00000249B4370000-0x00000249B443B000-memory.dmp

      Filesize

      812KB

    • memory/4116-66-0x00000249B4AD0000-0x00000249B4AD1000-memory.dmp

      Filesize

      4KB

    • memory/4116-65-0x00000249B4370000-0x00000249B443B000-memory.dmp

      Filesize

      812KB

    • memory/4116-64-0x00007FFCE1570000-0x00007FFCE1580000-memory.dmp

      Filesize

      64KB

    • memory/4116-26-0x00007FFCE1570000-0x00007FFCE1580000-memory.dmp

      Filesize

      64KB