Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 06:26

General

  • Target

    5835f7375649e6871565a7ef1aac67d1.exe

  • Size

    104KB

  • MD5

    5835f7375649e6871565a7ef1aac67d1

  • SHA1

    f88f311e292506b25d55e958d3d8039f5b21a3cf

  • SHA256

    b9c68bb8d1bd7ebcfa7b81be65ce976207f07fff379a37ca8b18df4b82e92726

  • SHA512

    48515a8bf5f65a8e67d62c75cec87531b4cb021afbaeeefe09e4d092a4d484e92e7085b8e8c80701162a957f1e76620d40ac950519e70a8f2b49337a6cce4217

  • SSDEEP

    3072:dO/oA4eCemeWuG+2GMUtKftmJc0+6ODxcOHSrc3eU3RbaNB:dO/oA4eCemeWuG+2GMUQ0+hDqOHF3V3i

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5835f7375649e6871565a7ef1aac67d1.exe
    "C:\Users\Admin\AppData\Local\Temp\5835f7375649e6871565a7ef1aac67d1.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Local\Temp\5835f7375649e6871565a7ef1aac67d1.exe
      C:\Users\Admin\AppData\Local\Temp\5835f7375649e6871565a7ef1aac67d1.exe
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1384
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5835f7375649e6871565a7ef1aac67d1.bat" 0"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2224
        • C:\Windows\SysWOW64\c9mgr.exe
          C:\Windows\system32\c9mgr.exe /B
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1804
          • C:\Windows\SysWOW64\c9mgr.exe
            C:\Windows\SysWOW64\c9mgr.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:2068

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\5835f7375649e6871565a7ef1aac67d1.bat

          Filesize

          304B

          MD5

          42b2fd3644fba16aabae64767301e9a0

          SHA1

          28d46d313e8a787f8c553e65b9bea52330f85ddf

          SHA256

          b6511161540ce262166d02e4831f456af55c9bdc14362adf5f20b8d83e3532ed

          SHA512

          95270a037f4b9ade8c775e881cd4dda127e59104b8c12057b4d447c6256c261340407fe874e033b4e76c22426134e8e92098621e6e4b508f149fa0a9437409c3

        • C:\Windows\SysWOW64\c9mgr.exe

          Filesize

          104KB

          MD5

          5835f7375649e6871565a7ef1aac67d1

          SHA1

          f88f311e292506b25d55e958d3d8039f5b21a3cf

          SHA256

          b9c68bb8d1bd7ebcfa7b81be65ce976207f07fff379a37ca8b18df4b82e92726

          SHA512

          48515a8bf5f65a8e67d62c75cec87531b4cb021afbaeeefe09e4d092a4d484e92e7085b8e8c80701162a957f1e76620d40ac950519e70a8f2b49337a6cce4217

        • memory/1384-0-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/1384-2-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/1384-11-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/2068-19-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB

        • memory/2068-22-0x0000000000400000-0x0000000000411000-memory.dmp

          Filesize

          68KB