Analysis

  • max time kernel
    150s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/12/2023, 09:09

General

  • Target

    62765977c698cc28d25cce7a59c4f612.exe

  • Size

    700KB

  • MD5

    62765977c698cc28d25cce7a59c4f612

  • SHA1

    124f59d1ba517200aef6fea8df8bc2d7aec1fd02

  • SHA256

    23b2253631080c89ec207e5c58f807b9b5304edb21cad27a1e01cb69a43e6a14

  • SHA512

    702e63d50990130852971349016bb112753eaedae47ab7503fa28b79b38b06009f317ee77c4d1d8ea250c561e5d6ac70ceb76201c8b393b6e428bce2eaa35dcb

  • SSDEEP

    12288:v6Wq4aaE6KwyF5L0Y2D1PqLPJv4RgeOFj+kkDzTI7UP+AoIio9xMpj6qd3RD0:tthEVaPqLPJvleOUbzT4U2HIiV6AO

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 4 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • AutoIT Executable 1 IoCs

    AutoIT scripts compiled to PE executables.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3492
      • C:\Users\Admin\AppData\Local\Temp\62765977c698cc28d25cce7a59c4f612.exe
        "C:\Users\Admin\AppData\Local\Temp\62765977c698cc28d25cce7a59c4f612.exe"
        2⤵
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4444
        • C:\Users\Admin\AppData\Local\Temp\hh.exe
          C:\Users\Admin\AppData\Local\Temp/hh.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:436
          • C:\Users\Admin\AppData\Local\Temp\hh.exe
            C:\Users\Admin\AppData\Local\Temp\hh.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4732
        • C:\Users\Admin\AppData\Local\Temp\hah.exe
          C:\Users\Admin\AppData\Local\Temp/hah.exe
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:3896
          • C:\Users\Admin\AppData\Roaming\FlashPlayer.exe
            "C:\Users\Admin\AppData\Roaming\FlashPlayer.exe"
            4⤵
            • Drops startup file
            • Executes dropped EXE
            • Adds Run key to start application
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1068
    • C:\Windows\SysWOW64\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Roaming\FlashPlayer.exe" "FlashPlayer.exe" ENABLE
      1⤵
      • Modifies Windows Firewall
      PID:464

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\hah.exe

      Filesize

      26KB

      MD5

      0ce9160647d6f0a19f39100677ba4e6f

      SHA1

      7d07ad52a4d9699aa4792864b88bc5725385ea10

      SHA256

      46bb4c85226783ebc68fca0186fe51b543a58a6a3f74af4baf8d81bec186ae5c

      SHA512

      5f9bb6735c7b8e01202ca3e56c6c9b3b1e8cc8aa26352863b0595fb392cd1afc3487c577a99477bf911d1ad17443f76b1ab8223ce127972a2d0760f57069aa77

    • C:\Users\Admin\AppData\Local\Temp\hh.exe

      Filesize

      24KB

      MD5

      b3ea345b0f8d29a7ff069cbe9a5643f2

      SHA1

      6ff7707343bfc5d5b49e022470e458c18c8aa946

      SHA256

      211e75c00eb5f7815c9c0af5ed67b46c549d9310bf6e8f345ba47fca3cf0bd6f

      SHA512

      b2f3338e99525cf49b4da2bf3183c1cd9ba3bf019edfbe25648ed1aa6d7c42179e3d45cff8af3c18834c0d3f2e47505ea136ab2655bd7f32aa791f53a89980be

    • C:\Users\Admin\AppData\Local\Temp\hh.exe

      Filesize

      275KB

      MD5

      18cdca566f260b8de7c6b1e547bc8f6d

      SHA1

      00e354ecd83351d37af45af2d51639d37f2c3a83

      SHA256

      d6391cf80c3c5e78a15ae7a8a9de20b264a60a47ee2e0c1da62091be511dab30

      SHA512

      22bea645daf9f7d3b038ccc834f8d4ef530e7f4923afb43801c23f21c672d22ea3ccea7c674d19ad9891446f2f16b84ece0dc7fa4160c2a3ca3b0df564349696

    • C:\Users\Admin\AppData\Local\Temp\hh.exe

      Filesize

      225KB

      MD5

      46f895a980afa4872b6815d053265561

      SHA1

      c360f25b2ceb7a7b64334b9e5436ffb0b0c87d76

      SHA256

      e33bf14ff1a3a411ebe3de7875e269c435a98f553b1db265ce0f3ae1fad5f566

      SHA512

      d108fc206dcd15ab138cee30786bcb980a871325fd888dc7ab29ee694dffba50808c86f0b2f9c52a5be1bb0496b3f39c553bdd94b6732d2cd839d3d6d70e2dcc

    • memory/436-98-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-75-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-34-0x00000000762F0000-0x00000000763E0000-memory.dmp

      Filesize

      960KB

    • memory/436-36-0x00000000007D0000-0x00000000007E0000-memory.dmp

      Filesize

      64KB

    • memory/436-33-0x00000000762F0000-0x00000000763E0000-memory.dmp

      Filesize

      960KB

    • memory/436-32-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-35-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-37-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-41-0x00000000007D0000-0x00000000007E0000-memory.dmp

      Filesize

      64KB

    • memory/436-48-0x0000000073AE0000-0x0000000074091000-memory.dmp

      Filesize

      5.7MB

    • memory/436-52-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-38-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-39-0x00000000007D0000-0x00000000007E0000-memory.dmp

      Filesize

      64KB

    • memory/436-65-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-40-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-68-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-69-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-76-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-81-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-86-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-17-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-99-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-107-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-109-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-108-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-95-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-105-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-104-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-117-0x00000000762F0000-0x00000000763E0000-memory.dmp

      Filesize

      960KB

    • memory/436-118-0x0000000073AE0000-0x0000000074091000-memory.dmp

      Filesize

      5.7MB

    • memory/436-42-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-43-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-49-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-51-0x00000000762F0000-0x00000000763E0000-memory.dmp

      Filesize

      960KB

    • memory/436-30-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-53-0x00000000762F0000-0x00000000763E0000-memory.dmp

      Filesize

      960KB

    • memory/436-103-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-102-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-101-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-100-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-91-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-58-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-106-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-96-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-94-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-92-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-93-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-90-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-88-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-89-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-87-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-85-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-84-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-83-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-82-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-80-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-79-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-78-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-77-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-97-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-74-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-73-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-72-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-70-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-71-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-66-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-55-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-63-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/436-60-0x00000000007E0000-0x0000000000838000-memory.dmp

      Filesize

      352KB

    • memory/1068-64-0x0000000001150000-0x0000000001160000-memory.dmp

      Filesize

      64KB

    • memory/1068-127-0x0000000073AE0000-0x0000000074091000-memory.dmp

      Filesize

      5.7MB

    • memory/1068-128-0x0000000001150000-0x0000000001160000-memory.dmp

      Filesize

      64KB

    • memory/1068-67-0x0000000073AE0000-0x0000000074091000-memory.dmp

      Filesize

      5.7MB

    • memory/1068-61-0x0000000073AE0000-0x0000000074091000-memory.dmp

      Filesize

      5.7MB

    • memory/3896-59-0x0000000073AE0000-0x0000000074091000-memory.dmp

      Filesize

      5.7MB

    • memory/3896-31-0x0000000073AE0000-0x0000000074091000-memory.dmp

      Filesize

      5.7MB

    • memory/3896-28-0x0000000000D20000-0x0000000000D30000-memory.dmp

      Filesize

      64KB

    • memory/3896-27-0x0000000073AE0000-0x0000000074091000-memory.dmp

      Filesize

      5.7MB

    • memory/4444-0-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/4444-20-0x0000000000400000-0x00000000004C2000-memory.dmp

      Filesize

      776KB

    • memory/4732-116-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/4732-115-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB

    • memory/4732-120-0x0000000010000000-0x0000000010013000-memory.dmp

      Filesize

      76KB

    • memory/4732-110-0x0000000000400000-0x0000000000408000-memory.dmp

      Filesize

      32KB