Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 23:10

General

  • Target

    tmp.exe

  • Size

    737KB

  • MD5

    d54ddeb1ceaa4b97d777db0335765e31

  • SHA1

    e7d5613db327190562de2c627afceef830195f6c

  • SHA256

    3ba7c1a01fe40fab7b53ae3a50aaba4f1d1300a857f4b91352f2423a3f7a4cb2

  • SHA512

    6d07511e8e97896b98b7dfe16adfd19027aff7d7c9b0ec221a5165be28e52d7cd659692ab0ad52db02addc0f0213e60d3fcc9eb9d0bcde1353a52b63e01115aa

  • SSDEEP

    12288:f06gzHa2iNP1U8kM7j418EZYw4lB/brrGL98Muv6DXfuADUkySTLs7Tn:8TG1FDOTZYlhrGL98MJDUkRTL4z

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        3⤵
          PID:2032
        • C:\Users\Admin\AppData\Local\Temp\tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
          3⤵
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4428
      • C:\Windows\SysWOW64\systray.exe
        "C:\Windows\SysWOW64\systray.exe"
        2⤵
        • Modifies Internet Explorer settings
        PID:2840
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:3444

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2340-14-0x0000000074D70000-0x0000000075520000-memory.dmp

        Filesize

        7.7MB

      • memory/2340-1-0x0000000074D70000-0x0000000075520000-memory.dmp

        Filesize

        7.7MB

      • memory/2340-2-0x0000000005910000-0x0000000005EB4000-memory.dmp

        Filesize

        5.6MB

      • memory/2340-3-0x0000000074D70000-0x0000000075520000-memory.dmp

        Filesize

        7.7MB

      • memory/2340-4-0x0000000005360000-0x00000000053F2000-memory.dmp

        Filesize

        584KB

      • memory/2340-5-0x00000000052A0000-0x00000000052B0000-memory.dmp

        Filesize

        64KB

      • memory/2340-6-0x0000000005760000-0x000000000576A000-memory.dmp

        Filesize

        40KB

      • memory/2340-7-0x0000000007E30000-0x0000000007E48000-memory.dmp

        Filesize

        96KB

      • memory/2340-8-0x00000000052A0000-0x00000000052B0000-memory.dmp

        Filesize

        64KB

      • memory/2340-9-0x00000000067C0000-0x00000000067CA000-memory.dmp

        Filesize

        40KB

      • memory/2340-10-0x0000000006A90000-0x0000000006B0A000-memory.dmp

        Filesize

        488KB

      • memory/2340-11-0x0000000007EF0000-0x0000000007F8C000-memory.dmp

        Filesize

        624KB

      • memory/2340-0-0x00000000009B0000-0x0000000000A6E000-memory.dmp

        Filesize

        760KB

      • memory/2572-45-0x00000000030C0000-0x00000000030D0000-memory.dmp

        Filesize

        64KB

      • memory/2572-38-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-64-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-63-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-62-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-58-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-20-0x000000000D8B0000-0x000000000EF69000-memory.dmp

        Filesize

        22.7MB

      • memory/2572-59-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-61-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-60-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-57-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-56-0x00000000030C0000-0x00000000030D0000-memory.dmp

        Filesize

        64KB

      • memory/2572-26-0x000000000D8B0000-0x000000000EF69000-memory.dmp

        Filesize

        22.7MB

      • memory/2572-27-0x0000000009110000-0x0000000009210000-memory.dmp

        Filesize

        1024KB

      • memory/2572-54-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-29-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-30-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-31-0x00000000030C0000-0x00000000030D0000-memory.dmp

        Filesize

        64KB

      • memory/2572-32-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-33-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-34-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-35-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-36-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-55-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-41-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-40-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-42-0x00000000030C0000-0x00000000030D0000-memory.dmp

        Filesize

        64KB

      • memory/2572-43-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-44-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-52-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-46-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-48-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-50-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2572-47-0x00000000088E0000-0x00000000088F0000-memory.dmp

        Filesize

        64KB

      • memory/2840-28-0x0000000000F80000-0x0000000000FB6000-memory.dmp

        Filesize

        216KB

      • memory/2840-25-0x0000000000F80000-0x0000000000FB6000-memory.dmp

        Filesize

        216KB

      • memory/2840-22-0x0000000000F80000-0x0000000000FB6000-memory.dmp

        Filesize

        216KB

      • memory/2840-21-0x0000000000F80000-0x0000000000FB6000-memory.dmp

        Filesize

        216KB

      • memory/4428-12-0x0000000000400000-0x000000000043A000-memory.dmp

        Filesize

        232KB

      • memory/4428-15-0x00000000015C0000-0x000000000190A000-memory.dmp

        Filesize

        3.3MB

      • memory/4428-24-0x0000000003290000-0x00000000032AE000-memory.dmp

        Filesize

        120KB

      • memory/4428-23-0x0000000000400000-0x000000000043A000-memory.dmp

        Filesize

        232KB

      • memory/4428-19-0x0000000003290000-0x00000000032AE000-memory.dmp

        Filesize

        120KB

      • memory/4428-18-0x0000000000400000-0x000000000043A000-memory.dmp

        Filesize

        232KB

      • memory/4428-17-0x0000000000400000-0x000000000043A000-memory.dmp

        Filesize

        232KB

      • memory/4428-16-0x0000000000400000-0x000000000043A000-memory.dmp

        Filesize

        232KB