Analysis

  • max time kernel
    176s
  • max time network
    195s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 01:39

General

  • Target

    23149475a606c307ddfbd83ec62eae50.exe

  • Size

    1.0MB

  • MD5

    23149475a606c307ddfbd83ec62eae50

  • SHA1

    7b26528730414618ecdcce58f3f5ba16d604e13b

  • SHA256

    055eeb231a8d164638fb06673045514b018f738753e48f57f8ed48cac34f7af7

  • SHA512

    21ddb20d0177918248a95bf20fd2438a7ab67925c04ee8f4fc272a1a392df6ca481790457dd5f1698c636cb39299ea50986037e6dc8c79798871ce492b586ed2

  • SSDEEP

    24576:HbSaE4mvt/+/EWIw4ri+BQNnMabVAF318gp:HbSv4mvEDOgsPp

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • NSIS installer 6 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\23149475a606c307ddfbd83ec62eae50.exe
    "C:\Users\Admin\AppData\Local\Temp\23149475a606c307ddfbd83ec62eae50.exe"
    1⤵
    • Checks computer location settings
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1580
    • C:\Users\Admin\AppData\Local\Temp\File.exe
      "C:\Users\Admin\AppData\Local\Temp\File.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Users\Admin\AppData\Local\Temp\eicabfbcibhi.exe
        C:\Users\Admin\AppData\Local\Temp\eicabfbcibhi.exe 9-5-2-9-3-5-1-5-3-4-9 JktHOzosMis0LxcmTlM5TURDOC0cJkVAUk5MTUpEQTknFypCQFBPSD86LisvMjUXLD5IPzosFyZLUEZBUEJPXEU7NC4xKTIbLk5CTk08TV1MT0c8Y3FwZzEqLWpvcS0/Qk9CJE9NRyo8T0srRUU9Sh4mQEdIPkhFOzQ/WCgtZzVqamJPFypCKDpJVEg/QUkXKkIpOigwGyxAKjQoLxcsPzM4Ki0XJj8zNCosHypNTkY7UEFLXEtRRFM9OlA4HiZNTU4/Uj9LVkBTQz44HypNTkY7UEFLXElASEI5FyZAVjxcUFFHOhwmPFNDVkBIQ0dGSjw0Gy0/TE5TWj9ORk5OQ0k6LR8qUUQ4RUZXRlJaVE1JORcmUUs0LxsuP1AtNBcqUExLT0hIQltOPEdBRkpASEg+QzxMTUo0HSpITlxOTEVPR0RCOHNtcmEXJk1DS1JNTURLQ1ZMTkNJXD9AVFA5KRcqRkBBQFc4LhwmQE5dO1ZJQEhGP1Y8SUFJVktTQEE5XVhncVwdKkNKVEpDRjxCVkZLPCwtNSUoLTAlLi0xKTEwFyZPR0RCODAvLzQsKSs2KzIbLj9MU0VDSj87XE9ISEI5KyYzLSktLDQlNDYpJzUyLCdLTA==
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4992
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81704421457.txt bios get serialnumber
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3608
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81704421457.txt bios get version
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3056
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic /output:C:\Users\Admin\AppData\Local\Temp\81704421457.txt bios get version
          4⤵
            PID:3836
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic /output:C:\Users\Admin\AppData\Local\Temp\81704421457.txt bios get version
            4⤵
              PID:4116
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              wmic /output:C:\Users\Admin\AppData\Local\Temp\81704421457.txt bios get version
              4⤵
                PID:4720
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 4992 -s 916
                4⤵
                • Program crash
                PID:3204
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4992 -ip 4992
          1⤵
            PID:2412

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\81704421457.txt

            Filesize

            66B

            MD5

            9025468f85256136f923096b01375964

            SHA1

            7fcd174999661594fa5f88890ffb195e9858cc52

            SHA256

            d5418014fa8e6e17d8992fd12c0dfecac8a34855603ea58133e87ea09c2130df

            SHA512

            92cac37c332e6e276a963d659986a79a79867df44682bfc2d77ed7784ffa5e2c149e5960a83d03ef4cf171be40a73e93a110aaa53b95152fa9a9da6b41d31e51

          • C:\Users\Admin\AppData\Local\Temp\81704421457.txt

            Filesize

            2B

            MD5

            f3b25701fe362ec84616a93a45ce9998

            SHA1

            d62636d8caec13f04e28442a0a6fa1afeb024bbb

            SHA256

            b3d510ef04275ca8e698e5b3cbb0ece3949ef9252f0cdc839e9ee347409a2209

            SHA512

            98c5f56f3de340690c139e58eb7dac111979f0d4dffe9c4b24ff849510f4b6ffa9fd608c0a3de9ac3c9fd2190f0efaf715309061490f9755a9bfdf1c54ca0d84

          • C:\Users\Admin\AppData\Local\Temp\81704421457.txt

            Filesize

            58B

            MD5

            dd876faf0fd44a5fab3e82368e2e8b15

            SHA1

            01b04083fa278dda3a81705ca5abcfee487a3c90

            SHA256

            5602490a82bcacec8797d25cbb6f643fc9e69f89a2f0e6ec1e8d1f568e77a6b9

            SHA512

            e03d1def5b7fb0ed01a414cead199229ec0e153ff831d3ff5dd36c320572084c56a5e1369c753f868c855455758c0d308941b6187c348051419bd937d014cb8b

          • C:\Users\Admin\AppData\Local\Temp\File.exe

            Filesize

            213KB

            MD5

            36c5f695dd38a7f4831a2e38ed62dabb

            SHA1

            82e3420917660c53da71d1fb14060bd7468a1e1b

            SHA256

            d8c367077883368093001f19edee00d4976a40f1348c3e9da15716b22380c81e

            SHA512

            1e41024b7264abad4a9537a6956872791012f93ceab097797970748e73b4e56e5022146eb3f703e4d283dcf72c8b32d913d5b76128a352d6a2b443b07932626b

          • C:\Users\Admin\AppData\Local\Temp\File.exe

            Filesize

            146KB

            MD5

            fd6bbeb02d96a192e0951ed75e3ce875

            SHA1

            0cf91f2c30bc30eea9b2bf09382af846d8244a87

            SHA256

            39134e6ef2e31e074271117ddc9c979a9284fec3699b412fbf9926cd464f7857

            SHA512

            97ba05db2a02bb69e3cdeee120f70963cf01ecb5c837b011b72c300e64c45dab59c02f202ad98c4e326ffab4162f9c228eb03a7c4018b494b25ce510bb6724a2

          • C:\Users\Admin\AppData\Local\Temp\File.exe

            Filesize

            202KB

            MD5

            b44a9de5aaa13753949c7bfc4505a7e6

            SHA1

            86549fb6fe492bc6c192f6da0265deb0057f115a

            SHA256

            c3adb9be64e3975ac89af6a4719854df65ec4d689347143ea5d225f0904a5085

            SHA512

            c31083aea9fc3dba53dc9677ff83d3fa5237eb76a930d58f731752e944a0003db350582ab42e7d1c737671eb7816a8ac41f3d042902a6627cc4113b6bccfc871

          • C:\Users\Admin\AppData\Local\Temp\eicabfbcibhi.exe

            Filesize

            764KB

            MD5

            286462dd4060b816f673431fe19d9855

            SHA1

            0f93f8fb93025b9ddcc4674cf843e7e6bafd2fb9

            SHA256

            d67a728d2e997c38fc86e4b3bd63f0b544783794b6274dd9a65f58d8f793882c

            SHA512

            91f79d9a07c3eb6af1a71657f9c9c1ca8bb719e22bd365357c335713719c9b5d0eceedc0d9f85bdd1f491d85c27b49defe9f8fe0e3f2e4766c488be308a54011

          • C:\Users\Admin\AppData\Local\Temp\nsxACA.tmp\dnjzh.dll

            Filesize

            125KB

            MD5

            7d7518d98e68eebbb02ee06a931fd0c6

            SHA1

            73a1c22beb0381aa241a4542df29d20a9da5e033

            SHA256

            6fd1735c87fd55624f93a5141710324ba6c23788c8804ce387592a6599fe7f14

            SHA512

            bb33af0a4b0f21fb13112cdd6880575c5ff7b19b67ec6db74f7c558a7666f8aa34864650313a4e5f56afb239da0d7e1a6c9e6c1d789907aa2c31e930e7103117

          • C:\Users\Admin\AppData\Local\Temp\nsxACA.tmp\nsisunz.dll

            Filesize

            40KB

            MD5

            5f13dbc378792f23e598079fc1e4422b

            SHA1

            5813c05802f15930aa860b8363af2b58426c8adf

            SHA256

            6e87ecb7f62039fbb6e7676422d1a5e75a32b90dde6865dcb68ee658ba8df61d

            SHA512

            9270635a5294482f49e0292e26d45dd103b85fe27dc163d44531b095c5f9dbde6b904adaf1a888ba3c112a094380394713c796f5195b2566a20f00b42b6578e5

          • memory/1580-1-0x0000000000D20000-0x0000000000D30000-memory.dmp

            Filesize

            64KB

          • memory/1580-15-0x000000001C090000-0x000000001C108000-memory.dmp

            Filesize

            480KB

          • memory/1580-0-0x00007FFD71AE0000-0x00007FFD72481000-memory.dmp

            Filesize

            9.6MB

          • memory/1580-91-0x00007FFD71AE0000-0x00007FFD72481000-memory.dmp

            Filesize

            9.6MB