Analysis

  • max time kernel
    143s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 11:04

General

  • Target

    16b1cd32e9575e3f1c1d664d07fd6056.exe

  • Size

    163KB

  • MD5

    16b1cd32e9575e3f1c1d664d07fd6056

  • SHA1

    1ef1b9180ed3e3e7feb8d520cb3c0587883fefa2

  • SHA256

    53a9c3a6f8a799c8693f3c186a70a16b27dfab478ac760d11708f62df7076282

  • SHA512

    dd05602c6f7cc545cf4ce93cd23c62c36a086c049030482dfc55ac2dbe65a2d0cdc25b2e12e15b66a803d8931ac3e074a48e3e572d9c240b6a74075e10639948

  • SSDEEP

    1536:QrxobpgNDOknApFd9FIKUSDAdwjnucYAz67OxfNP4JAG9Ir09wQRRB3ESciKeEeP:sgpgFOdpFd9iKhDquu4zvxfZIwm5US

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\16b1cd32e9575e3f1c1d664d07fd6056.exe
    "C:\Users\Admin\AppData\Local\Temp\16b1cd32e9575e3f1c1d664d07fd6056.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3968
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del C:\Users\Admin\AppData\Local\Temp\16b1cd32e9575e3f1c1d664d07fd6056.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4064
      • C:\Windows\SysWOW64\choice.exe
        choice /C Y /N /D Y /T 3
        3⤵
          PID:3708
      • C:\Users\Admin\AppData\Roaming\Dibifu_9\vshost32.exe
        "C:\Users\Admin\AppData\Roaming\Dibifu_9\vshost32.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        PID:3384

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Roaming\Dibifu_9\IconExtractor.dll

            Filesize

            10KB

            MD5

            a21a157e7f27cb80cdd82cdb02dc2da6

            SHA1

            90a8a42d7356f06b1c144e657071461ddb224752

            SHA256

            35ba8730dd874fca3c0348bb38f972c099dbc7ba0f1c9b748dcfebdde1b0004e

            SHA512

            c4c68a9fa6f130526a0a0ec010d92dae38b81aebcf0fa3256b561987aa7b26e98b69bbc2acad4bafdc29ee2e6f714d81583baac2e28a8a25f62045ad84dba2a5

          • memory/3384-22-0x0000000074AA0000-0x0000000075250000-memory.dmp

            Filesize

            7.7MB

          • memory/3384-19-0x0000000074AA0000-0x0000000075250000-memory.dmp

            Filesize

            7.7MB

          • memory/3384-21-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

            Filesize

            64KB

          • memory/3384-23-0x0000000004DB0000-0x0000000004DC0000-memory.dmp

            Filesize

            64KB

          • memory/3384-27-0x00000000009C0000-0x00000000009C8000-memory.dmp

            Filesize

            32KB

          • memory/3968-3-0x0000000005660000-0x00000000056F2000-memory.dmp

            Filesize

            584KB

          • memory/3968-2-0x0000000005D20000-0x00000000062C4000-memory.dmp

            Filesize

            5.6MB

          • memory/3968-4-0x0000000005630000-0x0000000005640000-memory.dmp

            Filesize

            64KB

          • memory/3968-5-0x0000000005730000-0x000000000573A000-memory.dmp

            Filesize

            40KB

          • memory/3968-20-0x0000000074AA0000-0x0000000075250000-memory.dmp

            Filesize

            7.7MB

          • memory/3968-0-0x0000000000C60000-0x0000000000C90000-memory.dmp

            Filesize

            192KB

          • memory/3968-1-0x0000000074AA0000-0x0000000075250000-memory.dmp

            Filesize

            7.7MB