Analysis

  • max time kernel
    34s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-12-2023 18:31

General

  • Target

    0c06f083669936e75cb5782736ad8b7a.exe

  • Size

    78KB

  • MD5

    0c06f083669936e75cb5782736ad8b7a

  • SHA1

    02b6ad6159b912a4c18e7547f7124a8f17112526

  • SHA256

    42fbd98c949e98a02eabefbc6b3660c3f37266ab41eabbb86e95c6e992184a5a

  • SHA512

    24089c56140497abdf96ecb434812e0e966a635eaa056326d8f03db22a2376a644d919173d7ae59471ffa3e757784b7ba61ae49f34d7a268c8299831587c594e

  • SSDEEP

    1536:B3x5wUDc03v7M4qZmMwo23LSXxIhRsYHHsiLLqGeg:xx5wUDc4TNqs5o23LnPsYHMiLLk

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0c06f083669936e75cb5782736ad8b7a.exe
    "C:\Users\Admin\AppData\Local\Temp\0c06f083669936e75cb5782736ad8b7a.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2124
    • C:\Users\Admin\AppData\Local\Temp\Trojan.exe
      "C:\Users\Admin\AppData\Local\Temp\Trojan.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Trojan.exe" "Trojan.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        PID:1804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Trojan.exe

    Filesize

    25KB

    MD5

    8b67be0bdac2b81a8223a063f45022bc

    SHA1

    99f255617790dd81faddbd2623ca1654e8dabaf9

    SHA256

    eadd83364e775c3842ca069dd97b3d98b313244ff6de348f27eef1d3b2e8d53d

    SHA512

    72c9c8f8b8a863d489732fa2ba4a331899ec36d803f7da9970069085a16ec29ff1b7779c5976698486dc1b32e5267f1b59f1d2f410837a7a58a8daa9f351cf66

  • C:\Users\Admin\AppData\Local\Temp\Trojan.exe

    Filesize

    43KB

    MD5

    3182678347da02c39f7dab7acb45ed48

    SHA1

    e05222464a85ce746ab3200b4312e97e683a734c

    SHA256

    0d39624d80191c098f87e84d6d90f904f4ca57bcde5796fe2025a9fbf1682efe

    SHA512

    c5fe526e553f0b8d35876d08bb42a08573c7cd84e3d8b6287f516685f054f74da36eeb6041be24c1e5f6b2767e54a90dc45109d747609464adab8351966ab1ff

  • C:\Users\Admin\AppData\Local\Temp\Trojan.exe

    Filesize

    9KB

    MD5

    2ba20800da10687d12a71acd772786b1

    SHA1

    a80dafd1604245bd060a4a6f47026e7eab66a334

    SHA256

    6559ea0a7624f2c35faed3fdd0463df22fa36edf96218c28719feb8a9c795365

    SHA512

    ff3c0b6f5e4e30b4bbe00efa78e295578b531462d79b26c994e266efdb8b7f3bc5dfe3dc9380532f04db2d3abdee55c87a856d8c57193d4e73f01659a812a680

  • memory/2124-0-0x0000000074F90000-0x0000000075541000-memory.dmp

    Filesize

    5.7MB

  • memory/2124-14-0x0000000074F90000-0x0000000075541000-memory.dmp

    Filesize

    5.7MB

  • memory/2124-1-0x0000000000A80000-0x0000000000A90000-memory.dmp

    Filesize

    64KB

  • memory/2124-2-0x0000000074F90000-0x0000000075541000-memory.dmp

    Filesize

    5.7MB

  • memory/3608-12-0x0000000074F90000-0x0000000075541000-memory.dmp

    Filesize

    5.7MB

  • memory/3608-13-0x0000000000710000-0x0000000000720000-memory.dmp

    Filesize

    64KB

  • memory/3608-15-0x0000000074F90000-0x0000000075541000-memory.dmp

    Filesize

    5.7MB

  • memory/3608-17-0x0000000074F90000-0x0000000075541000-memory.dmp

    Filesize

    5.7MB

  • memory/3608-19-0x0000000000710000-0x0000000000720000-memory.dmp

    Filesize

    64KB

  • memory/3608-18-0x0000000074F90000-0x0000000075541000-memory.dmp

    Filesize

    5.7MB