Analysis

  • max time kernel
    149s
  • max time network
    161s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/01/2024, 10:22

General

  • Target

    48b7b491175b6eeac589438208d3eb26.exe

  • Size

    337KB

  • MD5

    48b7b491175b6eeac589438208d3eb26

  • SHA1

    bbdcaf1b1cbf0cc58128eb95596ed672097aa64b

  • SHA256

    13d38e976d16b8c71f44e85ee12b549ed3cca1990fcc1814463bba57b09b253e

  • SHA512

    13e43d2d77b72c27528185c310600c6a4eeba25cc98a6d2dfb64ab30f0410e34faed2e0cd02985fb09d53488a58d3166d32b3895c0ec248c9d6f8fc6a09f956a

  • SSDEEP

    6144:rYJGOaUmbGq4hwAqKL30jadpnFxQRnpR6:cJGOYzCjqg30javmr6

Score
8/10

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48b7b491175b6eeac589438208d3eb26.exe
    "C:\Users\Admin\AppData\Local\Temp\48b7b491175b6eeac589438208d3eb26.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5096
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c "sc create "48b7b491175b6eeac589438208d3eb26" binPath= "C:\Users\Admin\AppData\Local\Temp\48b7b491175b6eeac589438208d3eb26.exe" start= auto && sc start "48b7b491175b6eeac589438208d3eb26" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1832
      • C:\Windows\SysWOW64\sc.exe
        sc start "48b7b491175b6eeac589438208d3eb26"
        3⤵
        • Launches sc.exe
        PID:4768
      • C:\Windows\SysWOW64\sc.exe
        sc create "48b7b491175b6eeac589438208d3eb26" binPath= "C:\Users\Admin\AppData\Local\Temp\48b7b491175b6eeac589438208d3eb26.exe" start= auto
        3⤵
        • Launches sc.exe
        PID:1056
  • C:\Users\Admin\AppData\Local\Temp\48b7b491175b6eeac589438208d3eb26.exe
    C:\Users\Admin\AppData\Local\Temp\48b7b491175b6eeac589438208d3eb26.exe
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    PID:332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/332-14-0x0000000000D60000-0x0000000000DD3000-memory.dmp

    Filesize

    460KB

  • memory/332-9-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/332-19-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5096-0-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/5096-5-0x00000000021B0000-0x0000000002223000-memory.dmp

    Filesize

    460KB

  • memory/5096-15-0x00000000021B0000-0x0000000002223000-memory.dmp

    Filesize

    460KB

  • memory/5096-16-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB