Analysis

  • max time kernel
    194s
  • max time network
    201s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 06:40

General

  • Target

    SEPTEMBER SOA UPDATED.exe

  • Size

    697KB

  • MD5

    c168d1d3280b593afad44345005394c7

  • SHA1

    ddc7e2bae92d3b9ffada893d9d15bfcca8e7e267

  • SHA256

    d54779db2e1229fd52e0f90f52422accfa374f74645a9ca20503e2c8a6669630

  • SHA512

    5803f8cf1a3b750c11e5ef2db499ddce0adc22d5d616e6a6c526efe60324cc09d62cfcf839c82f55158acbf6193b96c50358ef67fe4d0f4bfb7fb92fc2e630b2

  • SSDEEP

    12288:KccAckjm+aMz4vYr9Jm1Zcq12jFncwQcs4T/9naWP8I6aiCwPtck8YU:ski/M8qmjNSncwFZda5aiCKCTY

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3184
    • C:\Users\Admin\AppData\Local\Temp\SEPTEMBER SOA UPDATED.exe
      "C:\Users\Admin\AppData\Local\Temp\SEPTEMBER SOA UPDATED.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2436
      • C:\Users\Admin\AppData\Local\Temp\SEPTEMBER SOA UPDATED.exe
        "C:\Users\Admin\AppData\Local\Temp\SEPTEMBER SOA UPDATED.exe"
        3⤵
          PID:1344
        • C:\Users\Admin\AppData\Local\Temp\SEPTEMBER SOA UPDATED.exe
          "C:\Users\Admin\AppData\Local\Temp\SEPTEMBER SOA UPDATED.exe"
          3⤵
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1960
      • C:\Windows\SysWOW64\cmstp.exe
        "C:\Windows\SysWOW64\cmstp.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4936

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1960-25-0x00000000031B0000-0x00000000031CF000-memory.dmp

            Filesize

            124KB

          • memory/1960-17-0x0000000000400000-0x000000000043A000-memory.dmp

            Filesize

            232KB

          • memory/1960-24-0x0000000000400000-0x000000000043A000-memory.dmp

            Filesize

            232KB

          • memory/1960-19-0x0000000000400000-0x000000000043A000-memory.dmp

            Filesize

            232KB

          • memory/1960-18-0x0000000000400000-0x000000000043A000-memory.dmp

            Filesize

            232KB

          • memory/1960-16-0x00000000014F0000-0x000000000183A000-memory.dmp

            Filesize

            3.3MB

          • memory/1960-13-0x0000000000400000-0x000000000043A000-memory.dmp

            Filesize

            232KB

          • memory/1960-20-0x00000000031B0000-0x00000000031CF000-memory.dmp

            Filesize

            124KB

          • memory/2436-9-0x0000000006E80000-0x0000000006E8A000-memory.dmp

            Filesize

            40KB

          • memory/2436-5-0x0000000005960000-0x000000000596A000-memory.dmp

            Filesize

            40KB

          • memory/2436-7-0x0000000075020000-0x00000000757D0000-memory.dmp

            Filesize

            7.7MB

          • memory/2436-11-0x0000000007500000-0x000000000757A000-memory.dmp

            Filesize

            488KB

          • memory/2436-12-0x00000000088C0000-0x000000000895C000-memory.dmp

            Filesize

            624KB

          • memory/2436-6-0x00000000072E0000-0x00000000072F6000-memory.dmp

            Filesize

            88KB

          • memory/2436-15-0x0000000075020000-0x00000000757D0000-memory.dmp

            Filesize

            7.7MB

          • memory/2436-2-0x0000000005F40000-0x00000000064E4000-memory.dmp

            Filesize

            5.6MB

          • memory/2436-1-0x0000000075020000-0x00000000757D0000-memory.dmp

            Filesize

            7.7MB

          • memory/2436-4-0x00000000058E0000-0x00000000058F0000-memory.dmp

            Filesize

            64KB

          • memory/2436-10-0x0000000006E90000-0x0000000006E9C000-memory.dmp

            Filesize

            48KB

          • memory/2436-3-0x0000000005990000-0x0000000005A22000-memory.dmp

            Filesize

            584KB

          • memory/2436-8-0x00000000058E0000-0x00000000058F0000-memory.dmp

            Filesize

            64KB

          • memory/2436-0-0x0000000000EE0000-0x0000000000F94000-memory.dmp

            Filesize

            720KB

          • memory/3184-28-0x000000000D0D0000-0x000000000E83C000-memory.dmp

            Filesize

            23.4MB

          • memory/3184-21-0x000000000D0D0000-0x000000000E83C000-memory.dmp

            Filesize

            23.4MB

          • memory/3184-30-0x0000000007A80000-0x0000000007B77000-memory.dmp

            Filesize

            988KB

          • memory/3184-31-0x0000000007A80000-0x0000000007B77000-memory.dmp

            Filesize

            988KB

          • memory/3184-34-0x0000000007A80000-0x0000000007B77000-memory.dmp

            Filesize

            988KB

          • memory/4936-23-0x0000000000550000-0x0000000000586000-memory.dmp

            Filesize

            216KB

          • memory/4936-22-0x0000000000550000-0x0000000000586000-memory.dmp

            Filesize

            216KB

          • memory/4936-26-0x00000000027A0000-0x0000000002AEA000-memory.dmp

            Filesize

            3.3MB

          • memory/4936-27-0x0000000000550000-0x0000000000586000-memory.dmp

            Filesize

            216KB

          • memory/4936-29-0x00000000025A0000-0x000000000263E000-memory.dmp

            Filesize

            632KB

          • memory/4936-32-0x0000000000550000-0x0000000000586000-memory.dmp

            Filesize

            216KB

          • memory/4936-33-0x00000000025A0000-0x000000000263E000-memory.dmp

            Filesize

            632KB