Analysis

  • max time kernel
    193s
  • max time network
    233s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 22:34

General

  • Target

    408355a0a90beebb6637719830b41ee5.exe

  • Size

    186KB

  • MD5

    408355a0a90beebb6637719830b41ee5

  • SHA1

    2d479e6e65c53e5615c8420aee9309c5bea108e0

  • SHA256

    2159bfb9b83d80708a9b4a81666ff2ac76c82c4d50dc94c02086e9383a8df958

  • SHA512

    a18fb0fe9dfb2b4d1435300c5c31fd3a5faa55b0c90e2e84b1e7aaa9fb5680a707e3989279240d3b67d81ebb63a26b3b84f06095989aabe82e9435f6ebea93cd

  • SSDEEP

    3072:7X7DItrfaocyTgfsqQOlJGa/UCAVa7zpBYQar3FT6rPxlivJE1uAKvsNLIkcZCsc:7saocyLCG8AVa7YL1eLxYO1DKUNL6N7g

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\408355a0a90beebb6637719830b41ee5.exe
    "C:\Users\Admin\AppData\Local\Temp\408355a0a90beebb6637719830b41ee5.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:5048
    • C:\Users\Admin\AppData\Local\Temp\nsgBA54.tmp\inst.exe
      C:\Users\Admin\AppData\Local\Temp\nsgBA54.tmp\inst.exe 519ccf03-7d58-4734-a488-45e35bc06f2f.exe /dT131650040S1541849476 /e8012553 /t1541849476 /u519ccf03-7d58-4734-a488-45e35bc06f2f
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:316
      • C:\Users\Admin\AppData\Local\Temp\nsgBA54.tmp\519ccf03-7d58-4734-a488-45e35bc06f2f.exe
        "C:\Users\Admin\AppData\Local\Temp\nsgBA54.tmp\519ccf03-7d58-4734-a488-45e35bc06f2f.exe" /dT131650040S1541849476 /e8012553 /t1541849476 /u519ccf03-7d58-4734-a488-45e35bc06f2f
        3⤵
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:716

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30

    Filesize

    1KB

    MD5

    541137d165e78d1fce6c1fe04a4b155e

    SHA1

    7a59a115c7044d016e6112bff114451c07edf305

    SHA256

    a939c29a18db19346e1422182912fd2bf78a7a26623c894537fe6a0d2994daa2

    SHA512

    3939fd192c6aa750b6b046fa88cccc284b8a88ebb35a6a20913099de10e1173e309ce678c1c9cc587c27e1f424b9b63cde63cfd697bc95cbaad63b2a6998e545

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    604B

    MD5

    a8c8eb8bf71ea727e35148b09b26fec7

    SHA1

    f4ab4a15766b9d1e7253ecbb20973af8affbdb7c

    SHA256

    21c9949032173647ca9cd7fd03822577e2eaeefa0954974f9dd8a9d7ed4c0e13

    SHA512

    dc04414bf8dd78dafef8d5582ced4c8ab9e466354c03ddaa3014c1400934692a4dbabbf6200616e5364b4a69ce4192f283852a126c1e938a1705cd005d0c6d55

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9

    Filesize

    5B

    MD5

    5bfa51f3a417b98e7443eca90fc94703

    SHA1

    8c015d80b8a23f780bdd215dc842b0f5551f63bd

    SHA256

    bebe2853a3485d1c2e5c5be4249183e0ddaff9f87de71652371700a89d937128

    SHA512

    4cd03686254bb28754cbaa635ae1264723e2be80ce1dd0f78d1ab7aee72232f5b285f79e488e9c5c49ff343015bd07bb8433d6cee08ae3cea8c317303e3ac399

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1F39B5CFACECFDE48DB25BCA2231FAC6_F0E2901B5CB9DFCB03318B8D06C40A30

    Filesize

    412B

    MD5

    f5fc12ed9f4b9fbdc8beef2035763af9

    SHA1

    fccc983c08e54d09a23824a17d93f7ba0efbe1ad

    SHA256

    134eb5c292629befc581e5486b2b5e9fda15ce0e745ef9adcd5392184a55e076

    SHA512

    8f2e37117e3e05b36fb0e751ddf0c35a1fe0c9cd0383890a44ca0c2cf6dba04e30e8e137ad150555d3a7ac9030aa3523cecaceafd40773acccfab95202b83728

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B

    Filesize

    188B

    MD5

    381034e0fed2ecf91ad0ee1c47d81b2a

    SHA1

    09fe28ae89739a63fc4f50690cd30f5c11553beb

    SHA256

    ad9767b9f11e1e82728b94925ba8e69f164b816a04606aca1702133020d80327

    SHA512

    0444940f7edee415df5afc7badf3b4bcbfd325b0bc23ac5cad4fe86f8cd307a7ac3ab23f51da6d27846ba981316ba9943eb4025b961a08d270f30e7f66c76b13

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9

    Filesize

    404B

    MD5

    d4186f412ddb9c2a7af4a555a28d2fb7

    SHA1

    9bf6fa00585b5446d69312257c9429a040276920

    SHA256

    c44c2738e4a11aaf2d9ce36927f07d35bc0fef03a721ca0a2b08efcc88669c9b

    SHA512

    d34d4e82b20018383f8a020dcb8b6c40a6600b39d83babc7f92a4062dc39bc33a6f7d98beac6f4102f0e5c6a00acc737c11003db5460dec855da17631bd8c2ad

  • C:\Users\Admin\AppData\Local\Temp\nsgBA54.tmp\519ccf03-7d58-4734-a488-45e35bc06f2f.exe

    Filesize

    161KB

    MD5

    fea751116d26cdd3b5976bb20e746615

    SHA1

    cc451d9d4594c76717b69df84b14f4fce512503a

    SHA256

    ffcda5ceafb9d740ffb811bf221f1780c87a1ce6b1b2a5b4ba96905c1c9a8170

    SHA512

    9e09872223247f1849c98a1c7649ef68fa4eaac7f0c64484259b28df39ee09a941762c114824fbf09dd2dd3a1b4a569d5b09fd1d01b0f366b1c41a3e485ac081

  • C:\Users\Admin\AppData\Local\Temp\nsgBA54.tmp\inst.exe

    Filesize

    144KB

    MD5

    6c13897aac76495646cb21a0f3026459

    SHA1

    3b852f19dfe1efc220356abce7b99a491cc44e3a

    SHA256

    174d6c4705673cfbd506f0cb916a766dd4e1a45f3ba1b124d4cda16fcd66582c

    SHA512

    93ca87000dc1ec560f153da999f7489b3a856ded0653e981667bc5a2af7f4f4a886a3f982c6e2db05351668bf8fc20f80d8a27591e49f4d9bc20a11a260d8051

  • C:\Users\Admin\AppData\Local\Temp\nsgBA54.tmp\nsExec.dll

    Filesize

    8KB

    MD5

    249ae678f0dac4c625c6de6aca53823a

    SHA1

    6ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201

    SHA256

    7298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce

    SHA512

    66e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7

  • memory/316-15-0x00007FFE4F4E0000-0x00007FFE4FE81000-memory.dmp

    Filesize

    9.6MB

  • memory/316-34-0x0000000001380000-0x0000000001390000-memory.dmp

    Filesize

    64KB

  • memory/316-11-0x00007FFE4F4E0000-0x00007FFE4FE81000-memory.dmp

    Filesize

    9.6MB

  • memory/316-12-0x0000000001380000-0x0000000001390000-memory.dmp

    Filesize

    64KB

  • memory/316-29-0x000000001C5D0000-0x000000001C5F0000-memory.dmp

    Filesize

    128KB

  • memory/316-47-0x00007FFE4F4E0000-0x00007FFE4FE81000-memory.dmp

    Filesize

    9.6MB

  • memory/716-53-0x00000000749B0000-0x0000000074F61000-memory.dmp

    Filesize

    5.7MB

  • memory/716-54-0x0000000000D10000-0x0000000000D20000-memory.dmp

    Filesize

    64KB

  • memory/716-52-0x00000000749B0000-0x0000000074F61000-memory.dmp

    Filesize

    5.7MB

  • memory/716-61-0x0000000000D10000-0x0000000000D20000-memory.dmp

    Filesize

    64KB

  • memory/716-62-0x0000000000D10000-0x0000000000D20000-memory.dmp

    Filesize

    64KB

  • memory/716-63-0x0000000000D10000-0x0000000000D20000-memory.dmp

    Filesize

    64KB

  • memory/716-64-0x0000000000D10000-0x0000000000D20000-memory.dmp

    Filesize

    64KB

  • memory/716-65-0x00000000749B0000-0x0000000074F61000-memory.dmp

    Filesize

    5.7MB

  • memory/716-67-0x00000000749B0000-0x0000000074F61000-memory.dmp

    Filesize

    5.7MB

  • memory/5048-51-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB

  • memory/5048-10-0x000000006E940000-0x000000006E948000-memory.dmp

    Filesize

    32KB

  • memory/5048-9-0x0000000000400000-0x0000000000439000-memory.dmp

    Filesize

    228KB