Analysis

  • max time kernel
    151s
  • max time network
    169s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 18:10

General

  • Target

    599add1fb4e5c5bbc75ce45783ef1bdaeda7275f5527ee0ef22378d830d301fc.exe

  • Size

    198KB

  • MD5

    dd918283da4b7ea5f068afa446c8af78

  • SHA1

    ff50572f35de3253edcede1535abb3f609e3aee2

  • SHA256

    599add1fb4e5c5bbc75ce45783ef1bdaeda7275f5527ee0ef22378d830d301fc

  • SHA512

    13a70544b5bb282e382ecd1f31a1ca0c710805aa92447d2e75f56c862b8e897424a4ae3519ba42eafc1850718d6d346f5b8d8be7790894b56f7f545676ace7a7

  • SSDEEP

    6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOu:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXj

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\599add1fb4e5c5bbc75ce45783ef1bdaeda7275f5527ee0ef22378d830d301fc.exe
    "C:\Users\Admin\AppData\Local\Temp\599add1fb4e5c5bbc75ce45783ef1bdaeda7275f5527ee0ef22378d830d301fc.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4508
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\599ADD~1.EXE > nul
      2⤵
        PID:4568
    • C:\Windows\Debug\akmhost.exe
      C:\Windows\Debug\akmhost.exe
      1⤵
      • Executes dropped EXE
      • Checks processor information in registry
      PID:4720

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Debug\akmhost.exe

      Filesize

      198KB

      MD5

      617044476080be49d436afe9adf51285

      SHA1

      aeca47107011fef4ec823403dd291fd5fe5bf253

      SHA256

      f8c4e5a32ad7a59bf1720cbdd86c3cd17808baabdbfa45bc37d63336bd09e2cc

      SHA512

      ab5a869cae668736d2c7280b54703db991ac24bcb15d7d5320c2ea443edba8552530b5022899e72900cdeeca509a496a4016d908794418a675a8685f2e38f064

    • C:\Windows\debug\akmhost.exe

      Filesize

      198KB

      MD5

      617044476080be49d436afe9adf51285

      SHA1

      aeca47107011fef4ec823403dd291fd5fe5bf253

      SHA256

      f8c4e5a32ad7a59bf1720cbdd86c3cd17808baabdbfa45bc37d63336bd09e2cc

      SHA512

      ab5a869cae668736d2c7280b54703db991ac24bcb15d7d5320c2ea443edba8552530b5022899e72900cdeeca509a496a4016d908794418a675a8685f2e38f064