Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 11:41

General

  • Target

    58d53a0d2cfb30999c8f85df90b0f6a6.exe

  • Size

    789KB

  • MD5

    58d53a0d2cfb30999c8f85df90b0f6a6

  • SHA1

    c1fab9ab4d9a0df787d814419881be84573ec90d

  • SHA256

    9a3eccbaada8ec20bc5c83ae3604209cda18675831dc9fecea199e4ac21cd1ee

  • SHA512

    0f1a6bfd63d23293446021340c207f753f7b336e4e569492af0946724134ecff5401ca5a368eb6afad5d131bf242cddbc1afef9dfdf060d5450ee173aa45e3e0

  • SSDEEP

    12288:RtobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu443m:Rt8RHjEgYAw1hZlZTWQu7igcyKPEuj2

Score
5/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\58d53a0d2cfb30999c8f85df90b0f6a6.exe
    "C:\Users\Admin\AppData\Local\Temp\58d53a0d2cfb30999c8f85df90b0f6a6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1012
    • C:\Users\Admin\AppData\Local\Temp\nsz7929.tmp\internal58d53a0d2cfb30999c8f85df90b0f6a6.exe
      C:\Users\Admin\AppData\Local\Temp\nsz7929.tmp\internal58d53a0d2cfb30999c8f85df90b0f6a6.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/58d53a0d2cfb30999c8f85df90b0f6a6.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsz7929.tmp/fallbackfiles/'
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\23298.bat" "C:\Users\Admin\AppData\Local\Temp\AEBD27775D7A4CC38E10C47CADDEC292\""
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4580
        • C:\Windows\SysWOW64\PING.EXE
          ping 1.1.1.1 -n 1 -w 1000
          4⤵
          • Runs ping.exe
          PID:3292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\$Recycle.Bin\S-1-5-21-1815711207-1844170477-3539718864-1000\$IQOREAK

    Filesize

    98B

    MD5

    7164007a959d2dab9ad9e7ff1a4fa3aa

    SHA1

    7fc26d445815d7f6030f457a8e42458dd061362c

    SHA256

    aaa35b480a31a3963e100883b1a45f7346bc7543a7c1bf971b13c1fdcc0166be

    SHA512

    216a1c1c520400963e656c039105de153ae1cf3eae76518ce22c056418c0c1d1afca62edd11d7d26a2da80a9a891662edf732b4c99b63f306c48c7aa5179e56f

  • C:\Users\Admin\AppData\Local\Temp\23298.bat

    Filesize

    212B

    MD5

    668767f1e0c7ff2b3960447e259e9f00

    SHA1

    32d8abf834cce72f5e845175a0af2513b00504d8

    SHA256

    cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d

    SHA512

    c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680

  • C:\Users\Admin\AppData\Local\Temp\AEBD27775D7A4CC38E10C47CADDEC292\AEBD27775D7A4CC38E10C47CADDEC292_LogFile.txt

    Filesize

    9KB

    MD5

    cf46de6bfaf57505876a026294076d92

    SHA1

    054d3d258a8754b225aa48e4c04d987e04fe0ea3

    SHA256

    66c2c63628ba1755d78cda0e5efaced8f829853936f5314a29b90b5c5f21cc1c

    SHA512

    069853ad36be7e4316ef9bdda715431e2450917afbcef5de7367cf0bf0cbe7fd50c2a5ebd4c49ab470c81392b507062ba3a5c266f04edace65910eb02cf73481

  • C:\Users\Admin\AppData\Local\Temp\AEBD27775D7A4CC38E10C47CADDEC292\AEBD27~1.TXT

    Filesize

    104KB

    MD5

    bf379c7bbe64ce3bd7c3a016c200fe39

    SHA1

    8af72a45ac4acc2504651c684ff29f3643a6c080

    SHA256

    fe1f5c7fefa1ed2d05eb24471292369b97200232cdf9881f89e5662e87bd5ae7

    SHA512

    f6986645cd77f23e5a819c3bef6ba8ae8c43c85939a895c6c29d5d5c2a62de1b55315ef96158ce864d294fc6e13327ceff8d15c42a91926638050e40449663a4

  • C:\Users\Admin\AppData\Local\Temp\nsz7929.tmp\StdUtils.dll

    Filesize

    14KB

    MD5

    21010df9bc37daffcc0b5ae190381d85

    SHA1

    a8ba022aafc1233894db29e40e569dfc8b280eb9

    SHA256

    0ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16

    SHA512

    95d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e

  • C:\Users\Admin\AppData\Local\Temp\nsz7929.tmp\internal58d53a0d2cfb30999c8f85df90b0f6a6.exe

    Filesize

    1.8MB

    MD5

    9ab5db4bb5971035b4d287d64f9676b5

    SHA1

    33d17f016339572dd05c124d6243fffefd0cd039

    SHA256

    f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209

    SHA512

    d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066

  • C:\Users\Admin\AppData\Local\Temp\nsz7929.tmp\internal58d53a0d2cfb30999c8f85df90b0f6a6_icon.ico

    Filesize

    17KB

    MD5

    055c2cb77fa2edc2802b7fd397b9c213

    SHA1

    e6bf5af3427539bf609cfb8904b35803a06104d3

    SHA256

    78d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2

    SHA512

    7dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65

  • C:\Users\Admin\AppData\Local\Temp\nsz7929.tmp\internal58d53a0d2cfb30999c8f85df90b0f6a6_splash.png

    Filesize

    12KB

    MD5

    fe272d040e82704707b19bfbf29d65ca

    SHA1

    460de628ea63986a7e6390a1623d8ba32dc82aee

    SHA256

    1cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983

    SHA512

    8a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b

  • memory/1012-297-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/1356-78-0x0000000003E30000-0x0000000003E31000-memory.dmp

    Filesize

    4KB