Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-12-2023 17:46

General

  • Target

    32050adefb91ca7c5a7fecbf86647784.exe

  • Size

    393KB

  • MD5

    32050adefb91ca7c5a7fecbf86647784

  • SHA1

    b0c08e13b33aef6b13ce50078484be426888b023

  • SHA256

    3a7e73d197980a72cfa212a4ebb2eab809c1cf1abf0be5e7ffde4275d513b477

  • SHA512

    bf7469872038646a581711b3c453d9a6669b2a985d6ee8505faabdaa16cbdc64fef20c4e5bccbac3be929af35996df3608f236c9ee3b17f8785b2947a44128c3

  • SSDEEP

    6144:TbXE9OiTGfhEClq98bd3BTznTiVrDpXA7U4ze4FGkxKawNSH:fU9XiuiHbdxTznTor2lGkx5N

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 11 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\32050adefb91ca7c5a7fecbf86647784.exe
    "C:\Users\Admin\AppData\Local\Temp\32050adefb91ca7c5a7fecbf86647784.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3588
    • C:\Windows\SysWOW64\mspaint.exe
      "C:\Windows\system32\mspaint.exe" "C:\Program Files (x86)\kk2\kk1\monkeypad.jpg" /ForceBootstrapPaint3D
      2⤵
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1152
    • C:\Program Files (x86)\kk2\kk1\iphone.exe
      "C:\Program Files (x86)\kk2\kk1\iphone.exe"
      2⤵
      • Executes dropped EXE
      PID:516
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 516 -s 516
        3⤵
        • Program crash
        PID:3832
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\kk2\kk1\bramapod.bat" "
      2⤵
      • Drops file in Drivers directory
      PID:4904
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1212
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    PID:1972
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 516 -ip 516
    1⤵
      PID:3792

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\kk2\kk1\bramapod.bat

      Filesize

      2KB

      MD5

      d3e2b787c9bb557f868b37a2dda64c82

      SHA1

      77c7ee948c18f982c3c393f49552024a929a6a35

      SHA256

      4ce4840298e5362057936d7dc444ba68dc4f2a7a370476e318b8aee892f87ffe

      SHA512

      db1a37a27bb3e9fc41afcebc08735ec4990f7715ff6935cdad8476726c80a217bb663dbd68ccb780ffe29d5d4e546bdfa8caae8ba655a5f751cd64c9998b3634

    • C:\Program Files (x86)\kk2\kk1\monkeypad.jpg

      Filesize

      14KB

      MD5

      1ce53b5898c48aad343c8c9039aec3d1

      SHA1

      d38c295815a6f65892d52da1984e1ad5bc342210

      SHA256

      d36ecb544f4b14858914dd0f00d5b725ae842adb231054de599d45f523b5a7f8

      SHA512

      a0858dfd4c6018ca47c7a1f5db8019e46b63602ec184556eb001787184ab60c03e496ed1e66f063502b59eeb9964b0f84249b8ab78e34b96360d26b2440210bc

    • memory/516-72-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/516-70-0x0000000000400000-0x000000000048D000-memory.dmp

      Filesize

      564KB

    • memory/1972-67-0x000001D9E8E50000-0x000001D9E8E51000-memory.dmp

      Filesize

      4KB

    • memory/1972-65-0x000001D9E8E40000-0x000001D9E8E41000-memory.dmp

      Filesize

      4KB

    • memory/1972-66-0x000001D9E8E50000-0x000001D9E8E51000-memory.dmp

      Filesize

      4KB

    • memory/1972-64-0x000001D9E8E40000-0x000001D9E8E41000-memory.dmp

      Filesize

      4KB

    • memory/1972-63-0x000001D9E8DB0000-0x000001D9E8DB1000-memory.dmp

      Filesize

      4KB

    • memory/1972-59-0x000001D9E8D30000-0x000001D9E8D31000-memory.dmp

      Filesize

      4KB

    • memory/1972-61-0x000001D9E8DB0000-0x000001D9E8DB1000-memory.dmp

      Filesize

      4KB

    • memory/1972-52-0x000001D9E0A60000-0x000001D9E0A70000-memory.dmp

      Filesize

      64KB

    • memory/1972-48-0x000001D9E01A0000-0x000001D9E01B0000-memory.dmp

      Filesize

      64KB

    • memory/3588-44-0x0000000000400000-0x0000000000427000-memory.dmp

      Filesize

      156KB