Analysis

  • max time kernel
    174s
  • max time network
    191s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-11-2023 18:59

General

  • Target

    214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe

  • Size

    1.3MB

  • MD5

    bf08b2b016613d90c4ac0295c6b75fdf

  • SHA1

    841a8902ec5b7c41758d4e1d78d9527a67fe471d

  • SHA256

    214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d

  • SHA512

    845e00ee2737a2811b877a801a9e5a74daf5fef29efc54f9bed11bc416f93a9fb1cc066def7ce952128a866377358dba5193d399b66cf672b8108fcd719b8442

  • SSDEEP

    6144:p3ue8ySm8hQAAIfFrRXuEE+0l97mKwKRqHVqlWo86JQPDHDdx/Qtqa:z/zkFF+EExZmKbRuVqlWoPJQPDHvd

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 3 IoCs
  • UAC bypass 3 TTPs 12 IoCs
  • Adds policy Run key to start application 2 TTPs 25 IoCs
  • Disables RegEdit via registry modification 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 64 IoCs
  • Checks whether UAC is enabled 1 TTPs 6 IoCs
  • Looks up external IP address via web service 6 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe
    "C:\Users\Admin\AppData\Local\Temp\214ee6f6acbc386d55689dd7d35387a8d597ce8ec0a735919ab984a3338ea95d.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • Adds policy Run key to start application
    • Disables RegEdit via registry modification
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:4632
    • C:\Users\Admin\AppData\Local\Temp\zejmu.exe
      "C:\Users\Admin\AppData\Local\Temp\zejmu.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:2844
    • C:\Users\Admin\AppData\Local\Temp\zejmu.exe
      "C:\Users\Admin\AppData\Local\Temp\zejmu.exe" "-"
      2⤵
      • Modifies WinLogon for persistence
      • UAC bypass
      • Adds policy Run key to start application
      • Disables RegEdit via registry modification
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Modifies registry class
      • System policy modification
      PID:3760
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:3836

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\bazwywawrsmleattccjih.gei

      Filesize

      272B

      MD5

      4859f711f0c92f17acc8d518b7c42027

      SHA1

      8852fea2582985146d5ca36b6bdc30abb1089110

      SHA256

      76cb7791f672146264251e3d903c18583dc39d049f05419a15e567198042d810

      SHA512

      7ada124c020666709883b88024a2d02ea7d0ea4ebe4561010ee658c969d672289d61e83a815ccccf617aae837cb4ea89ae56ad714f01f1b23cceb82083921b86

    • C:\Program Files (x86)\bazwywawrsmleattccjih.gei

      Filesize

      272B

      MD5

      d5b63bfb44e79b14c86c355ced759479

      SHA1

      f8b68c92ab55f545adc89288fee05a3c5c0c2491

      SHA256

      2f21385f6df4203a17cfb375e51c6261ec14275a639247361453174071a1a1c2

      SHA512

      ab0792ac69f67fe7f2be6b03d89c4b9c60cf1c32e4e5a732c32ed37da150785c6baf09372a75db3d5fb517a41d29143cff0ebd395da0408c5cf17cff571aafe8

    • C:\Program Files (x86)\bazwywawrsmleattccjih.gei

      Filesize

      272B

      MD5

      9ff5b44d11ee938eb8a73454342040d4

      SHA1

      83d61d0531b79ca5d672f7cd58e98fb982eb7946

      SHA256

      5b6de59e1ab775109d2535cdefe7e662861568e2408f4d7c9f95fdcecb9a05de

      SHA512

      618040d70e985ed315441539a051dfaf75ab92c830df13e0791186769fafb153044f81ba8c682169c8dcfd2c2eb70207965697a33472953f208d17cf2f0dd7c3

    • C:\Program Files (x86)\bazwywawrsmleattccjih.gei

      Filesize

      272B

      MD5

      33c8c5ab557e88258d463f3d2844606d

      SHA1

      a7c197518ad3e77c0f617a0a7e4e859d6d981a24

      SHA256

      b60c5e59acf806bd6160adbae78e4e4c670ee5d6276a571a6e122ab813c4ff82

      SHA512

      9975a2ab63ee9fbaa71dd11d2648450b7d423404c719efc2eb44afe0ef6a6b127bb874280623027a392d51bac819d951f5773a9c04c59bb7cfa08e95fad1610a

    • C:\Users\Admin\AppData\Local\Temp\zejmu.exe

      Filesize

      2.1MB

      MD5

      d302552ac3c2db543dafb1f29051b146

      SHA1

      694d53f684fe6fe069bb96a8901aeddaabb7708e

      SHA256

      0f3b5dd27b2b3d101389cc3f65f6ebd5ee89c4792bb2631217da3f55da1b22b2

      SHA512

      5fdfe6917129a1363f441f13e2d3499ccb3c4f3d93d663a73f1166b055677ef5637ecfe4fe7246c39394e5c78ee6641d07890c97bcbd9fcd0e0eab5325a33c3e

    • C:\Users\Admin\AppData\Local\Temp\zejmu.exe

      Filesize

      2.1MB

      MD5

      d302552ac3c2db543dafb1f29051b146

      SHA1

      694d53f684fe6fe069bb96a8901aeddaabb7708e

      SHA256

      0f3b5dd27b2b3d101389cc3f65f6ebd5ee89c4792bb2631217da3f55da1b22b2

      SHA512

      5fdfe6917129a1363f441f13e2d3499ccb3c4f3d93d663a73f1166b055677ef5637ecfe4fe7246c39394e5c78ee6641d07890c97bcbd9fcd0e0eab5325a33c3e

    • C:\Users\Admin\AppData\Local\Temp\zejmu.exe

      Filesize

      2.1MB

      MD5

      d302552ac3c2db543dafb1f29051b146

      SHA1

      694d53f684fe6fe069bb96a8901aeddaabb7708e

      SHA256

      0f3b5dd27b2b3d101389cc3f65f6ebd5ee89c4792bb2631217da3f55da1b22b2

      SHA512

      5fdfe6917129a1363f441f13e2d3499ccb3c4f3d93d663a73f1166b055677ef5637ecfe4fe7246c39394e5c78ee6641d07890c97bcbd9fcd0e0eab5325a33c3e

    • C:\Users\Admin\AppData\Local\Temp\zejmu.exe

      Filesize

      2.1MB

      MD5

      d302552ac3c2db543dafb1f29051b146

      SHA1

      694d53f684fe6fe069bb96a8901aeddaabb7708e

      SHA256

      0f3b5dd27b2b3d101389cc3f65f6ebd5ee89c4792bb2631217da3f55da1b22b2

      SHA512

      5fdfe6917129a1363f441f13e2d3499ccb3c4f3d93d663a73f1166b055677ef5637ecfe4fe7246c39394e5c78ee6641d07890c97bcbd9fcd0e0eab5325a33c3e

    • C:\Users\Admin\AppData\Local\bazwywawrsmleattccjih.gei

      Filesize

      272B

      MD5

      135f2c8eaa31658a7ef33f923f63ff6d

      SHA1

      5f6a76614f2577c5a2393cb6153ebc9a5d0520be

      SHA256

      cc19a2db26f8c4e8576575b342265fbf5295f04c8c3b9981875f98944daecb24

      SHA512

      a1bc3087e8083c7aced8a39ee1f6d0ca0ab55bc2e839424f41d27470c513bd65b346009ab161eca4ef2325170d364472bdbbbe01f675de68bd3bc4ccd974bfdb

    • C:\Users\Admin\AppData\Local\wgqylujqwinxbimxrcueowjshouglvzg.vpa

      Filesize

      3KB

      MD5

      75c7b84550e72ee230d76f423ec420a8

      SHA1

      b123ca173beaf25ee330bc2de8d39c901a157675

      SHA256

      f539f368b9967b4d92a0bce75b699ab3d73bfff23585793c15101ecb970242b0

      SHA512

      af643995ca9a58730561a9e7d11dcd556b9aabd97b0d5541b5543a47f3cb5eea828313573cec73e4b5c2fc1958feca0e2221a3d2d6e0ecaf33d607503e4dfb14