Analysis

  • max time kernel
    132s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/12/2023, 19:59

General

  • Target

    0f57198eb71f37f1ec8b5c3cc6446ffe.exe

  • Size

    789KB

  • MD5

    0f57198eb71f37f1ec8b5c3cc6446ffe

  • SHA1

    3419e30a6bad63e242e0e92a6caa3ff20c2ffdb7

  • SHA256

    7f5ea56aa0866b82426719b62c668e880d628b655227f68ba08c4f755465caf2

  • SHA512

    14318049bd8daa30df34a353f08c2d9475e8429f7689a39080e471306c51ede86b1237f0237b125ce5a6d350299b02073235f5802f944da1599274b65cba7b23

  • SSDEEP

    12288:KtobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu44Rp:Kt8RHjEgYAw1hZlZTWQu7igcyKPEujf

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0f57198eb71f37f1ec8b5c3cc6446ffe.exe
    "C:\Users\Admin\AppData\Local\Temp\0f57198eb71f37f1ec8b5c3cc6446ffe.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3808
    • C:\Users\Admin\AppData\Local\Temp\nsi4D86.tmp\internal0f57198eb71f37f1ec8b5c3cc6446ffe.exe
      C:\Users\Admin\AppData\Local\Temp\nsi4D86.tmp\internal0f57198eb71f37f1ec8b5c3cc6446ffe.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/0f57198eb71f37f1ec8b5c3cc6446ffe.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsi4D86.tmp/fallbackfiles/'
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:5024
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\12063.bat" "C:\Users\Admin\AppData\Local\Temp\EDD6375C2FBF4C15AC1D427ED5F6C91A\""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1440
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:3004

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\$Recycle.Bin\S-1-5-21-768304381-2824894965-3840216961-1000\$IAAPCON

          Filesize

          98B

          MD5

          1579936646c066061053814066bda20f

          SHA1

          e6add8113b58923d5a8ec8e011a42454fc1257db

          SHA256

          1922ad57eb6941a52e445dccd02ded551cf425db82e6f77acb5cae9b5ac83b2b

          SHA512

          8776f18ebb8a1e940a5937da5fe24a00caec6a2aad5fb83a5a38ffa8552fb5f00261ab4ba623be9889df6f23d500d19c6710444af42c8855884061e1fa372049

        • C:\Users\Admin\AppData\Local\Temp\12063.bat

          Filesize

          212B

          MD5

          668767f1e0c7ff2b3960447e259e9f00

          SHA1

          32d8abf834cce72f5e845175a0af2513b00504d8

          SHA256

          cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d

          SHA512

          c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680

        • C:\Users\Admin\AppData\Local\Temp\EDD6375C2FBF4C15AC1D427ED5F6C91A\EDD6375C2FBF4C15AC1D427ED5F6C91A_LogFile.txt

          Filesize

          10KB

          MD5

          e62321c1799a6547cfd9e124543ea020

          SHA1

          51f6291f20ca5ed34759041c896be12f02d6cc86

          SHA256

          fe1d8d1896a5a508b64bd0311cc15d9603e10eeb857747799de561e9126a441d

          SHA512

          6e76fdc5b05aee138944395e275ae715119984f1b02a95d45928a2320a47cc2c08313cab4249bfd45c6c96608a6e641f8057dbc93a6b641dea81c6d0a3673d44

        • C:\Users\Admin\AppData\Local\Temp\EDD6375C2FBF4C15AC1D427ED5F6C91A\EDD637~1.TXT

          Filesize

          109KB

          MD5

          404237edc79848f8e6ce310bdf4e18ff

          SHA1

          c797d7b6e7d6b077ac9491b5f0b0c2a2bb8f36b0

          SHA256

          7976691f25f991071851c34112a5e7031e4c7377e58f85b82ccc74b769214720

          SHA512

          c21757af83dca95c474d15c8486c98c78ef9f5363b5d1ccb78ef4d5f56be973b0cdb98876bd68d55fa956f17a9941bf2ad0045ec4e1a45ce5f608c2681333e76

        • C:\Users\Admin\AppData\Local\Temp\nsi4D86.tmp\StdUtils.dll

          Filesize

          14KB

          MD5

          21010df9bc37daffcc0b5ae190381d85

          SHA1

          a8ba022aafc1233894db29e40e569dfc8b280eb9

          SHA256

          0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

          SHA512

          95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

        • C:\Users\Admin\AppData\Local\Temp\nsi4D86.tmp\internal0f57198eb71f37f1ec8b5c3cc6446ffe.exe

          Filesize

          1.8MB

          MD5

          9ab5db4bb5971035b4d287d64f9676b5

          SHA1

          33d17f016339572dd05c124d6243fffefd0cd039

          SHA256

          f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209

          SHA512

          d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066

        • C:\Users\Admin\AppData\Local\Temp\nsi4D86.tmp\internal0f57198eb71f37f1ec8b5c3cc6446ffe_icon.ico

          Filesize

          17KB

          MD5

          055c2cb77fa2edc2802b7fd397b9c213

          SHA1

          e6bf5af3427539bf609cfb8904b35803a06104d3

          SHA256

          78d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2

          SHA512

          7dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65

        • C:\Users\Admin\AppData\Local\Temp\nsi4D86.tmp\internal0f57198eb71f37f1ec8b5c3cc6446ffe_splash.png

          Filesize

          12KB

          MD5

          fe272d040e82704707b19bfbf29d65ca

          SHA1

          460de628ea63986a7e6390a1623d8ba32dc82aee

          SHA256

          1cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983

          SHA512

          8a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b

        • memory/3808-309-0x0000000000400000-0x000000000043B000-memory.dmp

          Filesize

          236KB

        • memory/5024-80-0x0000000003A70000-0x0000000003A71000-memory.dmp

          Filesize

          4KB