Analysis

  • max time kernel
    139s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/01/2024, 21:22

General

  • Target

    59725cb0473db90956b9116d7ff7541f.exe

  • Size

    681KB

  • MD5

    59725cb0473db90956b9116d7ff7541f

  • SHA1

    e67295a2f03192631a51411221e907eaa0c0136a

  • SHA256

    75f019ec7eb220c52b4c48b9b0f575254dbce6cd82bddf9e149ccb58486e655f

  • SHA512

    ee70e4447483c61b35eb8e6f406a0e7f9c4db54d0299c413b416d645f36ed9f991a9aead82a46da231e6d619a15708838a12813fd4a46a510d9bf4ad641112c1

  • SSDEEP

    12288:xeq2Jz4KcrdxByDWaR2sJvjGCDXJlbhvnDloCbKtrGxhl1xLO:xqz6xa2aD75nnbKsxhl1xy

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 48 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • NSIS installer 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\59725cb0473db90956b9116d7ff7541f.exe
    "C:\Users\Admin\AppData\Local\Temp\59725cb0473db90956b9116d7ff7541f.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1136
    • C:\Users\Admin\AppData\Local\Temp\tmp1.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp1.exe"
      2⤵
      • Executes dropped EXE
      PID:1440
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 236
        3⤵
        • Program crash
        PID:2480
    • C:\Users\Admin\AppData\Local\Temp\tmp2.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp2.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      PID:4420
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1440 -ip 1440
    1⤵
      PID:4868

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsxBB5.tmp\LangDLL.dll

            Filesize

            5KB

            MD5

            83c5a8e90cd10cb31a9215eb4421341f

            SHA1

            52ddbbfa955936f87516c52b2bb679a6b4363e22

            SHA256

            da006773e11871b8834036c30acab8fabcce2c9e9f52bb2b425f947bdf33f7c6

            SHA512

            46c20fd762a643028f3c4287ed3dbd762bc1cd17ee5ad1d90cbad23f15901fbab14b726d7f3e45eeb370fb6a2ee5268a2e9ebaae7ab6067c855361d24fc806a4

          • C:\Users\Admin\AppData\Local\Temp\nsxBB5.tmp\System.dll

            Filesize

            10KB

            MD5

            d4d09da0218ba046a66a294f0cca9dfe

            SHA1

            417b1acdeb0a4de6ac752a93080ca5b9164eb44b

            SHA256

            9090e47d239aa1da9598a483861165e0153c01ad9ff9d65cb6c0f4497a1da5b3

            SHA512

            3bc9a65842301dab56c139cc5a3457158d37ef294583728c93da1e11ae457df9551b0f8fbd03d5ea3058f3bc794d0ede57ea3efd5d663b45d25647a39cd955bf

          • C:\Users\Admin\AppData\Local\Temp\tmp1.exe

            Filesize

            45KB

            MD5

            76244c7d1578475d209ec88a2c3298fc

            SHA1

            6a9fc2390e3a07a48bc1d6b081f02444cee671b0

            SHA256

            b138120aee762fc3d31d353c3664b3d455ad2f9d40348a063adf60ebbea0b9c6

            SHA512

            33e3ca52e04f602914df8b7d764d875caddb39cd23eb116a7b14b0d77d45e4bddeff68b3051cd5491934dbc119dc9a663aeb6962c05e47dd9cefeebe88dafd0a

          • C:\Users\Admin\AppData\Local\Temp\tmp2.exe

            Filesize

            620KB

            MD5

            29c71a94981761d489143be5b5e9ef1b

            SHA1

            c7f0c631ccce90ab7f79a74c7998bcb27b28bf68

            SHA256

            c3f1865c755c1049f55c996d38d7398f2ba8d868ffefbc90e5d8d9082b290d73

            SHA512

            8b881f550e5be95f950a89278b2d91521d3bcb7bf43390e5cc09f20e25fc8ae006e89a62f43b81ee8cb2f1f70d8cde791470e8d1a0bdc82c857ae3945f64a04d

          • memory/1440-28-0x0000000000880000-0x0000000000890000-memory.dmp

            Filesize

            64KB