Analysis

  • max time kernel
    150s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 03:41

General

  • Target

    c656cfce42f8af35358b0ca2d991014674e12ab1f595caed8b490ef09bc093f3.exe

  • Size

    247KB

  • MD5

    be971bc35fa6da4753c50c5c139cf639

  • SHA1

    57bc50cca76ac01d96c0da58b4e045a5121eb816

  • SHA256

    c656cfce42f8af35358b0ca2d991014674e12ab1f595caed8b490ef09bc093f3

  • SHA512

    25d31b237f7c00014b8127c5483200488a60837bed0089b50d290dd2ac09ce51be98b2529046116c99712ee82096eef34883247216d5a2403005997c35b68d5f

  • SSDEEP

    6144:Omv+KyQrSOytJhmq4sJjzbc9GE2r4/Bl/UPd:B+KyQmpCqBVU9Gh0Bl/U

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c656cfce42f8af35358b0ca2d991014674e12ab1f595caed8b490ef09bc093f3.exe
    "C:\Users\Admin\AppData\Local\Temp\c656cfce42f8af35358b0ca2d991014674e12ab1f595caed8b490ef09bc093f3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2744
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c taskkill /im "c656cfce42f8af35358b0ca2d991014674e12ab1f595caed8b490ef09bc093f3.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\c656cfce42f8af35358b0ca2d991014674e12ab1f595caed8b490ef09bc093f3.exe" & exit
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1076
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im "c656cfce42f8af35358b0ca2d991014674e12ab1f595caed8b490ef09bc093f3.exe" /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:3844
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 1716
      2⤵
      • Program crash
      PID:3572
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2744 -ip 2744
    1⤵
      PID:5064

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2744-0-0x0000000002190000-0x00000000021B4000-memory.dmp

            Filesize

            144KB

          • memory/2744-1-0x00000000021C0000-0x00000000021FE000-memory.dmp

            Filesize

            248KB

          • memory/2744-2-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/2744-3-0x0000000002190000-0x00000000021B4000-memory.dmp

            Filesize

            144KB

          • memory/2744-4-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB

          • memory/2744-5-0x00000000021C0000-0x00000000021FE000-memory.dmp

            Filesize

            248KB

          • memory/2744-7-0x0000000000400000-0x000000000044C000-memory.dmp

            Filesize

            304KB