Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-12-2023 22:12

General

  • Target

    054caeb9d70b530cedc07f8db75a9d19.exe

  • Size

    1.1MB

  • MD5

    054caeb9d70b530cedc07f8db75a9d19

  • SHA1

    1a33f62e16087651172531a3758c44b0d9e9463b

  • SHA256

    121dfd22ce9a17034540eca2202372ec95369fa9817c4de9f0eb65f5dbd9e019

  • SHA512

    b96bf358d6f0b24332de73f359d183058dda7a254f904b9a5861495eb4cd8527b93f5178a0923e8e98a26a68142f891502443ed0f6a8b99cf8d82b9bbbdf4005

  • SSDEEP

    12288:kMiy4IadS4ms5I6e66fEheKhXsNtnQvMLOOar7nXDyyrwlKRtE9hTEnY54HIXjl+:kbSaE4mvt/Sunbx4beyA914o5/1duhf

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\054caeb9d70b530cedc07f8db75a9d19.exe
    "C:\Users\Admin\AppData\Local\Temp\054caeb9d70b530cedc07f8db75a9d19.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:432
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      "C:\Users\Admin\AppData\Local\Temp\File.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2680
      • C:\Users\Admin\AppData\Local\Temp\1431518523.exe
        C:\Users\Admin\AppData\Local\Temp\1431518523.exe 0/7/4/5/0/5/5/4/8/3/4 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
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3176
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703908096.txt bios get version
          4⤵
            PID:1008
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81703908096.txt bios get version
            4⤵
              PID:2440
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              wmic /output:C:\Users\Admin\AppData\Local\Temp\81703908096.txt bios get version
              4⤵
                PID:5080
              • C:\Windows\SysWOW64\Wbem\wmic.exe
                wmic /output:C:\Users\Admin\AppData\Local\Temp\81703908096.txt bios get version
                4⤵
                • Suspicious use of AdjustPrivilegeToken
                PID:784
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3176 -s 956
                4⤵
                • Program crash
                PID:396
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81703908096.txt bios get serialnumber
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3088
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3176 -ip 3176
          1⤵
            PID:4552

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\81703908096.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81703908096.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\81703908096.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\nse5247.tmp\nzhwgiu.dll

            Filesize

            153KB

            MD5

            f10c402fbfc9943ab636c7210c2244dc

            SHA1

            446e86eb4f7537ca83e6b0eecf2588d1d2bdd2af

            SHA256

            5c2b117014d669f9304f2467f2ab6b492a4fd90ddae0ed779877cd0f507da25c

            SHA512

            ad2c9e2bd2b0295c7d8168560d1947d1d007afb5622e4802b5a813b585e4ced7fee935502482bd58c956b7b0a4541ca04fdcb3960c996b29637ba3db4e306f29

          • memory/432-1-0x00000000001E0000-0x00000000001F0000-memory.dmp

            Filesize

            64KB

          • memory/432-0-0x00007FF974B10000-0x00007FF9754B1000-memory.dmp

            Filesize

            9.6MB

          • memory/432-17-0x000000001BCD0000-0x000000001BD48000-memory.dmp

            Filesize

            480KB

          • memory/432-92-0x00007FF974B10000-0x00007FF9754B1000-memory.dmp

            Filesize

            9.6MB