Analysis

  • max time kernel
    186s
  • max time network
    194s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-12-2023 00:56

General

  • Target

    093e57286e10c4e666db46cd80e83c20.exe

  • Size

    27KB

  • MD5

    093e57286e10c4e666db46cd80e83c20

  • SHA1

    f9eceb549e7c6f3609da0f354b65c9b5eb68d0dc

  • SHA256

    a2e97424599065a0b2f1c25f3881d0f42ba7abd4750ab6b682fb524a3834eaec

  • SHA512

    ca362631cf58b3f0ee082a67c57c6097aca4a1e8e2f4039b1fcf60202a1429086516ed2797b4e5a56c7d816ef4ef23939ca14d114fbf9dcefe581f87be64d0c2

  • SSDEEP

    768:81BcNG1uZNMVPUNHDejyRnFm0/TKKodowr:8GpHMKlnUuydo8

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 5 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\093e57286e10c4e666db46cd80e83c20.exe
    "C:\Users\Admin\AppData\Local\Temp\093e57286e10c4e666db46cd80e83c20.exe"
    1⤵
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4608
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Windows\system32\wincheck071204.dll" mymain
      2⤵
      • Checks computer location settings
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4900
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\mycjjk.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5072
        • C:\Windows\SysWOW64\wincheck071204.exe
          "C:\Windows\system32\wincheck071204.exe" i
          4⤵
          • Adds policy Run key to start application
          • Executes dropped EXE
          • Drops file in System32 directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2868
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\jkDelme.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:5012

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\wincheck071204.dll

    Filesize

    26KB

    MD5

    43e732a7c10d90e3f6fbd9f044328243

    SHA1

    1fa4637d03961d8e0826db95621e0b7e3ed4da46

    SHA256

    a8110f6a8fdc87c0194fce073aa35e70be5eaf9e5e68a55892e7b186bb11aa8d

    SHA512

    c6393818328ca372247b5a8e2624a89a77006b76321bb09b4129443ddd5ec17ab4184d1d64b9fcb489739f648a5582e78a60ee1a1cb404946bff917eccfcc5d9

  • C:\Windows\SysWOW64\wincheck071204.exe

    Filesize

    27KB

    MD5

    093e57286e10c4e666db46cd80e83c20

    SHA1

    f9eceb549e7c6f3609da0f354b65c9b5eb68d0dc

    SHA256

    a2e97424599065a0b2f1c25f3881d0f42ba7abd4750ab6b682fb524a3834eaec

    SHA512

    ca362631cf58b3f0ee082a67c57c6097aca4a1e8e2f4039b1fcf60202a1429086516ed2797b4e5a56c7d816ef4ef23939ca14d114fbf9dcefe581f87be64d0c2

  • C:\Windows\checkcj.ini

    Filesize

    141B

    MD5

    5c02dda9158ab4f4591ecbaaf01fe03a

    SHA1

    e0dabe014997b6efb82dab37562247e8a4f9360b

    SHA256

    60f20e446c263cde265c4d78858daaf31fd61ccab7ea11693592cd7a0bc4afeb

    SHA512

    c04ef5bb2ddc9c177e8337fe5a3199635bfd3c9ac66e2215e7cc261edf482d5db0bea0dee820e65b310b8bad9b0f16a5e01858a47250c21701c2daf3d8709a38

  • C:\Windows\checkcj.ini

    Filesize

    140B

    MD5

    505a8baf20d70f2264f437da46b90407

    SHA1

    b833a22f5f64c85e25fe3079268cb6bc3da671bc

    SHA256

    0a477c771b3aa9da7926a9904279de04ba727b44e5e788687e3ebe5c751b341e

    SHA512

    4fdb8b7050f82215383cbc77c5339cd81ffc470af64fdeda2e686a9be285d5084ccdf77477249c9ae5fbd54a3ccfc98bc57535d18f3f0192465ec5387af3c025

  • C:\jkDelme.bat

    Filesize

    205B

    MD5

    b9685d9b72dfcb98504d42d9cb71c751

    SHA1

    c63628390425622a422be9a1d3e58dbf02fb4389

    SHA256

    2aedf9922c0ca7fd2692ed1fc30d3ee6b8ea295ff84744ee8d88d668c5853b48

    SHA512

    2f399b7e6a0c52bbd19cbf9fc051a73063536f962fc74273597bed2bd76884634a79aa11fd34471a5de133f9794faa94e7544ce84d286012ba2ea29ab64d1c02

  • C:\mycjjk.bat

    Filesize

    52B

    MD5

    7613c54d05351d0110cab1e8f50e00d3

    SHA1

    e206b93cce28ec853f13152199064a0ef87d375b

    SHA256

    3951680106e4f5df715cd90f2911f66b6bac82fea2de68e6074d541b6310652b

    SHA512

    3015531529cd8989cf94cfc940471ce221d6a65494cb442f45e36dbd553326f412397db64fbb2abb54acf681662572b82cb99c909dc7a4d5083d95883a0e25e0

  • memory/4900-13-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/4900-23-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/4900-39-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB