Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2023, 05:39
Static task
static1
Behavioral task
behavioral1
Sample
201508181025.scr
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
201508181025.scr
Resource
win10v2004-20230915-en
General
-
Target
201508181025.scr
-
Size
510KB
-
MD5
94c7105fc53a647d5a694cac27bce921
-
SHA1
332de33d33b043e4f3f0fde6c39ceff57afd7950
-
SHA256
41ff4f324b319a1d9fea3948fa804e9a3b12dc12d0ec1b3ee92099cf4ad45c05
-
SHA512
9657c7b1c0cd9e5fb3dbccc0af550ae953e5870dbc177ad404d49c4dfb6ab8d67212af993e84eb6f39bbdf50cd7e7d8601d2e7f5ce1349e42b592d4ba95e675d
-
SSDEEP
12288:dLKzKPysMX+I4IA/V/aE5PhLiG5XvktM9pVF2OD:RKealTQjhLVvSSF7D
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1141987721-3945596982-3297311814-1000\Control Panel\International\Geo\Nation 201508181025.scr -
Executes dropped EXE 2 IoCs
pid Process 4320 fsguidll.exe 2088 fsguidll.exe -
Loads dropped DLL 2 IoCs
pid Process 4320 fsguidll.exe 2088 fsguidll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 3396 wmplayer.exe 3396 wmplayer.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 3396 wmplayer.exe 3396 wmplayer.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 3396 wmplayer.exe 3396 wmplayer.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 3396 wmplayer.exe 3396 wmplayer.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe 4496 msiexec.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 4320 fsguidll.exe 2088 fsguidll.exe 3396 wmplayer.exe 4496 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 4320 fsguidll.exe Token: SeTcbPrivilege 4320 fsguidll.exe Token: SeDebugPrivilege 2088 fsguidll.exe Token: SeTcbPrivilege 2088 fsguidll.exe Token: SeDebugPrivilege 3396 wmplayer.exe Token: SeTcbPrivilege 3396 wmplayer.exe Token: SeDebugPrivilege 4496 msiexec.exe Token: SeTcbPrivilege 4496 msiexec.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4320 fsguidll.exe 2088 fsguidll.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe 4496 msiexec.exe 3396 wmplayer.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1568 wrote to memory of 4320 1568 201508181025.scr 84 PID 1568 wrote to memory of 4320 1568 201508181025.scr 84 PID 1568 wrote to memory of 4320 1568 201508181025.scr 84 PID 2088 wrote to memory of 3396 2088 fsguidll.exe 89 PID 2088 wrote to memory of 3396 2088 fsguidll.exe 89 PID 2088 wrote to memory of 3396 2088 fsguidll.exe 89 PID 2088 wrote to memory of 3396 2088 fsguidll.exe 89 PID 2088 wrote to memory of 3396 2088 fsguidll.exe 89 PID 3396 wrote to memory of 4496 3396 wmplayer.exe 93 PID 3396 wrote to memory of 4496 3396 wmplayer.exe 93 PID 3396 wrote to memory of 4496 3396 wmplayer.exe 93 PID 3396 wrote to memory of 4496 3396 wmplayer.exe 93 PID 3396 wrote to memory of 4496 3396 wmplayer.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\201508181025.scr"C:\Users\Admin\AppData\Local\Temp\201508181025.scr" /S1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\fsguidll.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\fsguidll.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4320
-
-
C:\ProgramData\BYKJzaM\fsguidll.exeC:\ProgramData\BYKJzaM\fsguidll.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Program Files (x86)\Windows Media Player\wmplayer.exe"C:\Program Files (x86)\Windows Media Player\wmplayer.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\msiexec.exeC:\Windows\system32\msiexec.exe3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4496
-
-
-
C:\Windows\system32\WerFault.exe"C:\Windows\system32\WerFault.exe" -k -lc NDIS NDIS-20230915-0725.dmp1⤵PID:2896
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
454KB
MD52d7a648ebe64e536944c011c8dcbb375
SHA1f1ec39dddb224a6a1e40d55c8f6877c908f92bcf
SHA2565c5e3201d6343e0536b86cb4ab0831c482a304c62cd09c01ac8bdeee5755f635
SHA512cd11dc48806678264b409c4e3f6a71d8920882dcc5c3d8a7daa53fb5152fb5dbcc8a4694866e61d4cbac10849b0be340baae6525f8c7052f1003b671df60d79f
-
Filesize
454KB
MD52d7a648ebe64e536944c011c8dcbb375
SHA1f1ec39dddb224a6a1e40d55c8f6877c908f92bcf
SHA2565c5e3201d6343e0536b86cb4ab0831c482a304c62cd09c01ac8bdeee5755f635
SHA512cd11dc48806678264b409c4e3f6a71d8920882dcc5c3d8a7daa53fb5152fb5dbcc8a4694866e61d4cbac10849b0be340baae6525f8c7052f1003b671df60d79f
-
Filesize
34KB
MD56e7491e0ef07500a7492fd39edc7171f
SHA12a64539842c96d8d6000054f5d7bbb214b03abd4
SHA25696876d24284ff4e4155a78c043c8802421136afbc202033bf5e80d1053e3833f
SHA51216424ceb6108fe9c9a01662a0c3d888b40c67e33dc3d1380004e805690244aeb22b9f461588920168fd9fd21f795523ff7d54632dcff317e2e61141d2c636b51
-
Filesize
34KB
MD56e7491e0ef07500a7492fd39edc7171f
SHA12a64539842c96d8d6000054f5d7bbb214b03abd4
SHA25696876d24284ff4e4155a78c043c8802421136afbc202033bf5e80d1053e3833f
SHA51216424ceb6108fe9c9a01662a0c3d888b40c67e33dc3d1380004e805690244aeb22b9f461588920168fd9fd21f795523ff7d54632dcff317e2e61141d2c636b51
-
Filesize
34KB
MD56e7491e0ef07500a7492fd39edc7171f
SHA12a64539842c96d8d6000054f5d7bbb214b03abd4
SHA25696876d24284ff4e4155a78c043c8802421136afbc202033bf5e80d1053e3833f
SHA51216424ceb6108fe9c9a01662a0c3d888b40c67e33dc3d1380004e805690244aeb22b9f461588920168fd9fd21f795523ff7d54632dcff317e2e61141d2c636b51
-
Filesize
118KB
MD58d0ba0ad40b2888c3940eb3bd5f15103
SHA1d95fc1edad1c44a328e98deb753b949ee0c40f0d
SHA256acdc4987b74fdf7a32dff87d56c43df08cce071b493858e3ce32fcf8d6372837
SHA5121cede998b0494197a54e8c3a5e5fb0dcbb64876e60813718100ec3a79760836f9230826254178481b351a8f177046e2f19408edf203b9d139a664d97dc070e2d
-
Filesize
118KB
MD58d0ba0ad40b2888c3940eb3bd5f15103
SHA1d95fc1edad1c44a328e98deb753b949ee0c40f0d
SHA256acdc4987b74fdf7a32dff87d56c43df08cce071b493858e3ce32fcf8d6372837
SHA5121cede998b0494197a54e8c3a5e5fb0dcbb64876e60813718100ec3a79760836f9230826254178481b351a8f177046e2f19408edf203b9d139a664d97dc070e2d
-
Filesize
454KB
MD52d7a648ebe64e536944c011c8dcbb375
SHA1f1ec39dddb224a6a1e40d55c8f6877c908f92bcf
SHA2565c5e3201d6343e0536b86cb4ab0831c482a304c62cd09c01ac8bdeee5755f635
SHA512cd11dc48806678264b409c4e3f6a71d8920882dcc5c3d8a7daa53fb5152fb5dbcc8a4694866e61d4cbac10849b0be340baae6525f8c7052f1003b671df60d79f
-
Filesize
454KB
MD52d7a648ebe64e536944c011c8dcbb375
SHA1f1ec39dddb224a6a1e40d55c8f6877c908f92bcf
SHA2565c5e3201d6343e0536b86cb4ab0831c482a304c62cd09c01ac8bdeee5755f635
SHA512cd11dc48806678264b409c4e3f6a71d8920882dcc5c3d8a7daa53fb5152fb5dbcc8a4694866e61d4cbac10849b0be340baae6525f8c7052f1003b671df60d79f
-
Filesize
454KB
MD52d7a648ebe64e536944c011c8dcbb375
SHA1f1ec39dddb224a6a1e40d55c8f6877c908f92bcf
SHA2565c5e3201d6343e0536b86cb4ab0831c482a304c62cd09c01ac8bdeee5755f635
SHA512cd11dc48806678264b409c4e3f6a71d8920882dcc5c3d8a7daa53fb5152fb5dbcc8a4694866e61d4cbac10849b0be340baae6525f8c7052f1003b671df60d79f
-
Filesize
34KB
MD56e7491e0ef07500a7492fd39edc7171f
SHA12a64539842c96d8d6000054f5d7bbb214b03abd4
SHA25696876d24284ff4e4155a78c043c8802421136afbc202033bf5e80d1053e3833f
SHA51216424ceb6108fe9c9a01662a0c3d888b40c67e33dc3d1380004e805690244aeb22b9f461588920168fd9fd21f795523ff7d54632dcff317e2e61141d2c636b51
-
Filesize
34KB
MD56e7491e0ef07500a7492fd39edc7171f
SHA12a64539842c96d8d6000054f5d7bbb214b03abd4
SHA25696876d24284ff4e4155a78c043c8802421136afbc202033bf5e80d1053e3833f
SHA51216424ceb6108fe9c9a01662a0c3d888b40c67e33dc3d1380004e805690244aeb22b9f461588920168fd9fd21f795523ff7d54632dcff317e2e61141d2c636b51
-
Filesize
118KB
MD58d0ba0ad40b2888c3940eb3bd5f15103
SHA1d95fc1edad1c44a328e98deb753b949ee0c40f0d
SHA256acdc4987b74fdf7a32dff87d56c43df08cce071b493858e3ce32fcf8d6372837
SHA5121cede998b0494197a54e8c3a5e5fb0dcbb64876e60813718100ec3a79760836f9230826254178481b351a8f177046e2f19408edf203b9d139a664d97dc070e2d