Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-12-2023 14:07

General

  • Target

    392b9ee72b3167614ff530677eccf926.exe

  • Size

    665KB

  • MD5

    392b9ee72b3167614ff530677eccf926

  • SHA1

    ddabe40180e085d7df11e057e4232c76539a855a

  • SHA256

    63ac6385a0b6541e14e515f608bf2a37408234475e9676bc9738c6a5b6134e4f

  • SHA512

    6bf88e6fb205d5472605eb2d18331f9904978710794259b39a6965507aad66218a0e15eae456832c621142fce6f525251f84da618f85aa0d39d75f341217dffe

  • SSDEEP

    12288:BXDVWEq5U9Gg1ZWB9NNDBFTmp1/x3I2m3iCNLRPhCow2t06KFDGVeC:BXDoP5sWB9rzmPJ3IhVdhfwU06Y6B

Score
8/10

Malware Config

Signatures

  • Sets file execution options in registry 2 TTPs 64 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\392b9ee72b3167614ff530677eccf926.exe
    "C:\Users\Admin\AppData\Local\Temp\392b9ee72b3167614ff530677eccf926.exe"
    1⤵
    • Sets file execution options in registry
    • Checks computer location settings
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Temp\¼×¿Ç³æ.exe
      "C:\Temp\¼×¿Ç³æ.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:1940
  • C:\Windows\Alerterll.exe
    C:\Windows\Alerterll.exe
    1⤵
    • Executes dropped EXE
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4892
    • C:\Program Files\INTERNET eXPLORER\iexpLORE.EXE
      "C:\Program Files\INTERNET eXPLORER\iexpLORE.EXE"
      2⤵
        PID:2576
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4892 -s 680
        2⤵
        • Program crash
        PID:3640
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4892 -ip 4892
      1⤵
        PID:2812

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Temp\¼×¿Ç³æ.exe

        Filesize

        637KB

        MD5

        304e18dbab2fc143bf838ee9afa89730

        SHA1

        bc5f38f9832eeed145f5e31cdbf8432883afb98c

        SHA256

        a1a19ff2a94eb568d57fecfd8ce6c30b209c994a2862bfa94346fbeb9e95f12f

        SHA512

        a9dd01d8f0d4ed6112664bc46b61ef15a1956ad5f5d75bffdc96513131f4a4a813bc0b2e25ceed9ed3bf3ad4e7785e9ce5c19476df56281492f2108c08a2aebe

      • memory/1940-13-0x0000000000400000-0x00000000005BA000-memory.dmp

        Filesize

        1.7MB

      • memory/1940-14-0x0000000002320000-0x0000000002321000-memory.dmp

        Filesize

        4KB

      • memory/1940-17-0x00000000025E0000-0x00000000025E1000-memory.dmp

        Filesize

        4KB

      • memory/1940-27-0x00000000036A0000-0x00000000036A1000-memory.dmp

        Filesize

        4KB

      • memory/1940-26-0x00000000035A0000-0x00000000035A3000-memory.dmp

        Filesize

        12KB

      • memory/1940-41-0x0000000003640000-0x0000000003641000-memory.dmp

        Filesize

        4KB

      • memory/1940-40-0x0000000003650000-0x0000000003651000-memory.dmp

        Filesize

        4KB

      • memory/1940-76-0x0000000003E50000-0x0000000003E51000-memory.dmp

        Filesize

        4KB

      • memory/1940-75-0x0000000003E20000-0x0000000003E21000-memory.dmp

        Filesize

        4KB

      • memory/1940-74-0x0000000003AC0000-0x0000000003AC1000-memory.dmp

        Filesize

        4KB

      • memory/1940-73-0x0000000003AD0000-0x0000000003AD1000-memory.dmp

        Filesize

        4KB

      • memory/1940-72-0x0000000003AA0000-0x0000000003AA1000-memory.dmp

        Filesize

        4KB

      • memory/1940-71-0x0000000003AB0000-0x0000000003AB1000-memory.dmp

        Filesize

        4KB

      • memory/1940-70-0x0000000003A80000-0x0000000003A81000-memory.dmp

        Filesize

        4KB

      • memory/1940-69-0x0000000003A90000-0x0000000003A91000-memory.dmp

        Filesize

        4KB

      • memory/1940-68-0x0000000003A60000-0x0000000003A61000-memory.dmp

        Filesize

        4KB

      • memory/1940-67-0x0000000003A70000-0x0000000003A71000-memory.dmp

        Filesize

        4KB

      • memory/1940-66-0x0000000003A40000-0x0000000003A41000-memory.dmp

        Filesize

        4KB

      • memory/1940-65-0x0000000003A50000-0x0000000003A51000-memory.dmp

        Filesize

        4KB

      • memory/1940-64-0x0000000003A20000-0x0000000003A21000-memory.dmp

        Filesize

        4KB

      • memory/1940-63-0x00000000039E0000-0x00000000039E1000-memory.dmp

        Filesize

        4KB

      • memory/1940-62-0x00000000039F0000-0x00000000039F1000-memory.dmp

        Filesize

        4KB

      • memory/1940-61-0x0000000003A00000-0x0000000003A01000-memory.dmp

        Filesize

        4KB

      • memory/1940-60-0x00000000039C0000-0x00000000039C1000-memory.dmp

        Filesize

        4KB

      • memory/1940-59-0x00000000039D0000-0x00000000039D1000-memory.dmp

        Filesize

        4KB

      • memory/1940-58-0x0000000003870000-0x0000000003871000-memory.dmp

        Filesize

        4KB

      • memory/1940-57-0x0000000003880000-0x0000000003881000-memory.dmp

        Filesize

        4KB

      • memory/1940-56-0x0000000003850000-0x0000000003851000-memory.dmp

        Filesize

        4KB

      • memory/1940-55-0x0000000003860000-0x0000000003861000-memory.dmp

        Filesize

        4KB

      • memory/1940-54-0x0000000003830000-0x0000000003831000-memory.dmp

        Filesize

        4KB

      • memory/1940-53-0x0000000003840000-0x0000000003841000-memory.dmp

        Filesize

        4KB

      • memory/1940-52-0x0000000003800000-0x0000000003801000-memory.dmp

        Filesize

        4KB

      • memory/1940-51-0x0000000003810000-0x0000000003811000-memory.dmp

        Filesize

        4KB

      • memory/1940-50-0x00000000037E0000-0x00000000037E1000-memory.dmp

        Filesize

        4KB

      • memory/1940-49-0x00000000037F0000-0x00000000037F1000-memory.dmp

        Filesize

        4KB

      • memory/1940-48-0x00000000037C0000-0x00000000037C1000-memory.dmp

        Filesize

        4KB

      • memory/1940-47-0x00000000037D0000-0x00000000037D1000-memory.dmp

        Filesize

        4KB

      • memory/1940-46-0x00000000036B0000-0x00000000036B1000-memory.dmp

        Filesize

        4KB

      • memory/1940-45-0x0000000003680000-0x0000000003681000-memory.dmp

        Filesize

        4KB

      • memory/1940-44-0x0000000003690000-0x0000000003691000-memory.dmp

        Filesize

        4KB

      • memory/1940-43-0x0000000003660000-0x0000000003661000-memory.dmp

        Filesize

        4KB

      • memory/1940-42-0x0000000003670000-0x0000000003671000-memory.dmp

        Filesize

        4KB

      • memory/1940-39-0x0000000003620000-0x0000000003621000-memory.dmp

        Filesize

        4KB

      • memory/1940-38-0x0000000003630000-0x0000000003631000-memory.dmp

        Filesize

        4KB

      • memory/1940-37-0x0000000003600000-0x0000000003601000-memory.dmp

        Filesize

        4KB

      • memory/1940-36-0x0000000003610000-0x0000000003611000-memory.dmp

        Filesize

        4KB

      • memory/1940-35-0x0000000002920000-0x0000000002921000-memory.dmp

        Filesize

        4KB

      • memory/1940-34-0x0000000002700000-0x0000000002701000-memory.dmp

        Filesize

        4KB

      • memory/1940-33-0x00000000027C0000-0x00000000027C1000-memory.dmp

        Filesize

        4KB

      • memory/1940-32-0x00000000035C0000-0x00000000035C1000-memory.dmp

        Filesize

        4KB

      • memory/1940-31-0x0000000002360000-0x0000000002361000-memory.dmp

        Filesize

        4KB

      • memory/1940-30-0x0000000002650000-0x0000000002651000-memory.dmp

        Filesize

        4KB

      • memory/1940-29-0x00000000025A0000-0x00000000025A1000-memory.dmp

        Filesize

        4KB

      • memory/1940-28-0x00000000035F0000-0x00000000035F1000-memory.dmp

        Filesize

        4KB

      • memory/1940-25-0x00000000035B0000-0x00000000035B1000-memory.dmp

        Filesize

        4KB

      • memory/1940-24-0x00000000025D0000-0x00000000025D1000-memory.dmp

        Filesize

        4KB

      • memory/1940-23-0x0000000002640000-0x0000000002641000-memory.dmp

        Filesize

        4KB

      • memory/1940-22-0x0000000002610000-0x0000000002611000-memory.dmp

        Filesize

        4KB

      • memory/1940-21-0x0000000002620000-0x0000000002621000-memory.dmp

        Filesize

        4KB

      • memory/1940-20-0x00000000025B0000-0x00000000025B1000-memory.dmp

        Filesize

        4KB

      • memory/1940-19-0x00000000025C0000-0x00000000025C1000-memory.dmp

        Filesize

        4KB

      • memory/1940-18-0x0000000002630000-0x0000000002631000-memory.dmp

        Filesize

        4KB

      • memory/1940-16-0x0000000002600000-0x0000000002601000-memory.dmp

        Filesize

        4KB

      • memory/1940-15-0x00000000023B0000-0x0000000002404000-memory.dmp

        Filesize

        336KB