Analysis

  • max time kernel
    0s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-12-2023 05:10

General

  • Target

    56e00ae0c259a4f53a31cebc65836bae.exe

  • Size

    453KB

  • MD5

    56e00ae0c259a4f53a31cebc65836bae

  • SHA1

    c1028f238432baf7103ef1787e89ae6759a41a6a

  • SHA256

    134528e1bb2df40721b844a7ca899bd8e4d7f5b336271d04727d0e25353bec59

  • SHA512

    21dc4b682f31da16ec1644307beeda5a02cc9b9f62016418c0991f9dd07495a52baf9ec21f53548238c29e4ed89399d7414267b3b257f6b16683b1ea975f6704

  • SSDEEP

    12288:Zdtcsp3glHl1s15Ap/G/8g3D0Fw/tN8dkmLtpHHHrh7E:ZP3uHl6j8gz0FmcLbH1E

Score
7/10
upx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 6 IoCs
  • UPX packed file 1 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

Processes

  • C:\Users\Admin\AppData\Local\Temp\56e00ae0c259a4f53a31cebc65836bae.exe
    "C:\Users\Admin\AppData\Local\Temp\56e00ae0c259a4f53a31cebc65836bae.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    PID:5072
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      powershell.exe -inputformat none -NoProfile -NoLogo -Command "Write-Host ($PSVersionTable.psversion)"
      2⤵
        PID:4548
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell.exe -inputformat none -NoProfile -NoLogo -Command "& {$avlist = @(); $os = Get-WmiObject Win32_OperatingSystem; if ($os.ProductType -eq 3) {Write-Host \"ServerOS^|0\";} elseif ($os.Version -like \"5.*\") {Get-WmiObject -Namespace root\SecurityCenter -Class AntiVirusProduct | ForEach-Object {Write-Host \"$($_.displayName)^|$(if ($_.onAccessScanningEnabled) {\"4096\"} else {\"0\"})\"};} else {Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiVirusProduct | ForEach-Object {$avlist += \"$($_.displayName)^|$($_.productState)\"};Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiSpywareProduct | ForEach-Object {$avlist += \"$($_.displayName)^|$($_.productState)\"};} Write-Host ($avlist -join \"^*\")}"
        2⤵
          PID:3240

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3240-158-0x0000000005120000-0x0000000005130000-memory.dmp

        Filesize

        64KB

      • memory/3240-174-0x0000000072E80000-0x0000000073630000-memory.dmp

        Filesize

        7.7MB

      • memory/3240-170-0x0000000007870000-0x0000000007906000-memory.dmp

        Filesize

        600KB

      • memory/3240-172-0x0000000007EC0000-0x0000000008464000-memory.dmp

        Filesize

        5.6MB

      • memory/3240-171-0x0000000006BB0000-0x0000000006BD2000-memory.dmp

        Filesize

        136KB

      • memory/3240-156-0x0000000072E80000-0x0000000073630000-memory.dmp

        Filesize

        7.7MB

      • memory/3240-157-0x0000000005120000-0x0000000005130000-memory.dmp

        Filesize

        64KB

      • memory/3240-161-0x0000000005F70000-0x00000000062C4000-memory.dmp

        Filesize

        3.3MB

      • memory/4548-141-0x0000000005A80000-0x0000000005DD4000-memory.dmp

        Filesize

        3.3MB

      • memory/4548-148-0x0000000072E80000-0x0000000073630000-memory.dmp

        Filesize

        7.7MB

      • memory/4548-129-0x0000000005060000-0x0000000005082000-memory.dmp

        Filesize

        136KB

      • memory/4548-124-0x00000000026B0000-0x00000000026E6000-memory.dmp

        Filesize

        216KB

      • memory/4548-143-0x0000000006030000-0x000000000607C000-memory.dmp

        Filesize

        304KB

      • memory/4548-145-0x0000000006510000-0x000000000652A000-memory.dmp

        Filesize

        104KB

      • memory/4548-144-0x0000000007730000-0x0000000007DAA000-memory.dmp

        Filesize

        6.5MB

      • memory/4548-127-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/4548-142-0x0000000005FF0000-0x000000000600E000-memory.dmp

        Filesize

        120KB

      • memory/4548-130-0x00000000052C0000-0x0000000005326000-memory.dmp

        Filesize

        408KB

      • memory/4548-126-0x0000000004DA0000-0x0000000004DB0000-memory.dmp

        Filesize

        64KB

      • memory/4548-131-0x0000000005A10000-0x0000000005A76000-memory.dmp

        Filesize

        408KB

      • memory/4548-125-0x0000000072E80000-0x0000000073630000-memory.dmp

        Filesize

        7.7MB

      • memory/4548-128-0x00000000053E0000-0x0000000005A08000-memory.dmp

        Filesize

        6.2MB

      • memory/5072-91-0x0000000073740000-0x000000007374A000-memory.dmp

        Filesize

        40KB

      • memory/5072-15-0x00000000023E0000-0x0000000002406000-memory.dmp

        Filesize

        152KB