Analysis

  • max time kernel
    144s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 22:53

General

  • Target

    41948fe0f528fab753cc8a29d0b46487.exe

  • Size

    57KB

  • MD5

    41948fe0f528fab753cc8a29d0b46487

  • SHA1

    c11bb0daea4778a26c8e046adfac45f047ae6cfb

  • SHA256

    7032940aa7b5cd68794fc930268119970bccd3c0e842333e957b87550da6f4bd

  • SHA512

    7e04b89e32d98aa2a33442dde97dfa9f75487fe8ac7814d50cd81f5d6c0db5f71ac0d61d8cf606cad3508369553c28bcc409c648c3a5d96573727f83cfb31111

  • SSDEEP

    768:eve/wBPqJwgLBBQARQkWV/7ru6riNFgH0hJW5KKa+m6+jXmX3KvZF36TdEgBBQAq:8GLBBQARc7lV5o36TdEgBBQARPE

Score
10/10

Malware Config

Signatures

  • Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
  • Modifies AppInit DLL entries 2 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41948fe0f528fab753cc8a29d0b46487.exe
    "C:\Users\Admin\AppData\Local\Temp\41948fe0f528fab753cc8a29d0b46487.exe"
    1⤵
    • Adds autorun key to be loaded by Explorer.exe on startup
    • Checks computer location settings
    • Loads dropped DLL
    • Drops file in System32 directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2200
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SelfDel.bat" "
      2⤵
        PID:5044

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\SelfDel.bat

      Filesize

      279B

      MD5

      c59e7a74d76d1771dd27ae00604eb775

      SHA1

      bdb0edcd89a84a36256402d9ea386b1fa7f61f4d

      SHA256

      b0929ea46d01828f94338f12e5d957fefa58313005ab9241bc327ab39d911873

      SHA512

      8e2fc342434efdcbfebb109031f04a01f3b391e13e8e274c3322dd22b81c2cb96581ceab24bcfa57564095a6c1e4f94c0601d5770e43d3afbfa318333b8200b6

    • C:\Windows\SysWOW64\aehpoaeh.dll

      Filesize

      33KB

      MD5

      f1cdcccfc4ce607981c43fb8cbaa81a4

      SHA1

      8387787fdc1aab4a1a49e62e1257624f89a1fe04

      SHA256

      4b5d0d08e767d700cd9508493f72f3fa594d46baa1770801f5bf5d69002dc65f

      SHA512

      0c00598552479c382c468aa54488cf4285ed983279936ba0f0a99fea1be4e0aeb9c89d3d7b15b7f2c416aa818945d7dd97fb8cdba62e48090bd06392aadbb9b1

    • memory/2200-25-0x0000000000BB0000-0x0000000000BB1000-memory.dmp

      Filesize

      4KB

    • memory/2200-12-0x0000000000BC0000-0x0000000000BC1000-memory.dmp

      Filesize

      4KB

    • memory/2200-23-0x0000000000B90000-0x0000000000B91000-memory.dmp

      Filesize

      4KB

    • memory/2200-13-0x0000000000B30000-0x0000000000B31000-memory.dmp

      Filesize

      4KB

    • memory/2200-20-0x0000000000BD0000-0x0000000000BD1000-memory.dmp

      Filesize

      4KB

    • memory/2200-11-0x00000000001F0000-0x00000000001F1000-memory.dmp

      Filesize

      4KB

    • memory/2200-10-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

      Filesize

      4KB

    • memory/2200-19-0x0000000000B10000-0x0000000000B11000-memory.dmp

      Filesize

      4KB

    • memory/2200-21-0x0000000000470000-0x0000000000471000-memory.dmp

      Filesize

      4KB

    • memory/2200-26-0x0000000000BF0000-0x0000000000BF1000-memory.dmp

      Filesize

      4KB

    • memory/2200-0-0x0000000000400000-0x0000000000411000-memory.dmp

      Filesize

      68KB

    • memory/2200-24-0x00000000004B0000-0x00000000004B1000-memory.dmp

      Filesize

      4KB

    • memory/2200-1-0x00000000004D0000-0x00000000004D1000-memory.dmp

      Filesize

      4KB

    • memory/2200-3-0x0000000000AF0000-0x0000000000AF1000-memory.dmp

      Filesize

      4KB

    • memory/2200-22-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

      Filesize

      4KB

    • memory/2200-18-0x0000000000C30000-0x0000000000C31000-memory.dmp

      Filesize

      4KB

    • memory/2200-9-0x0000000000B20000-0x0000000000B21000-memory.dmp

      Filesize

      4KB

    • memory/2200-7-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/2200-6-0x0000000000B60000-0x0000000000B61000-memory.dmp

      Filesize

      4KB

    • memory/2200-5-0x0000000000460000-0x0000000000461000-memory.dmp

      Filesize

      4KB

    • memory/2200-4-0x0000000000B00000-0x0000000000B01000-memory.dmp

      Filesize

      4KB

    • memory/2200-30-0x0000000000400000-0x0000000000411000-memory.dmp

      Filesize

      68KB

    • memory/2200-29-0x00000000004C0000-0x00000000004C1000-memory.dmp

      Filesize

      4KB

    • memory/2200-2-0x0000000000B40000-0x0000000000B41000-memory.dmp

      Filesize

      4KB

    • memory/2200-32-0x00000000004C0000-0x00000000004C1000-memory.dmp

      Filesize

      4KB