Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/01/2024, 03:22

General

  • Target

    5a23641be49c0eea5f7f8852563f6d33.exe

  • Size

    1.2MB

  • MD5

    5a23641be49c0eea5f7f8852563f6d33

  • SHA1

    3469f3a77f4391a288fd272b8af7a1116d5b5326

  • SHA256

    bdc5e88ee7de3fe18eb38af9cadf1878258fe0f55dac409418fd3458235139d2

  • SHA512

    91a999ac19387149e8a2065a9db117e5b0a80fc128b14946f6efa3e216b9119f196d9524740abb12291be87a2d5bf3f2265a2418503f8a221ead389a292285d9

  • SSDEEP

    24576:7f7WNMY2HYvGAZHByqTIA/hZwz/DqllU8i5QFAWBBajC0jww:7DWOiTB/IDql/iOVzbVw

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 1 IoCs
  • Modifies Control Panel 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 8 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a23641be49c0eea5f7f8852563f6d33.exe
    "C:\Users\Admin\AppData\Local\Temp\5a23641be49c0eea5f7f8852563f6d33.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3136
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\ProgramData\82054625\82054625.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:792
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /im 5a23641be49c0eea5f7f8852563f6d33.exe /f
        3⤵
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:552
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c start C:\PROGRA~3\82054625\82054625.exe /install
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4880
        • C:\PROGRA~3\82054625\82054625.exe
          C:\PROGRA~3\82054625\82054625.exe /install
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Modifies Control Panel
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SendNotifyMessage
          PID:2972

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\82054625\82054625.bat

          Filesize

          290B

          MD5

          733572fcf968311eea6411ec4b7c2dac

          SHA1

          0d12f5cdf26162f608062087bf3a92cf93e3234e

          SHA256

          ca92f7929971b390f7b56062ae17f689238da1b67881af0b0b63a613bb816126

          SHA512

          626f801143e4c55eb96f19d7cab39a5fa483c5a0f4e1d42d0d96c1c86a663cb3c10c9296e54c58c5cc4d1f329f27169ee9695af884d4faeb4224fbea225bcd5e

        • C:\ProgramData\82054625\82054625.exe

          Filesize

          1.2MB

          MD5

          5a23641be49c0eea5f7f8852563f6d33

          SHA1

          3469f3a77f4391a288fd272b8af7a1116d5b5326

          SHA256

          bdc5e88ee7de3fe18eb38af9cadf1878258fe0f55dac409418fd3458235139d2

          SHA512

          91a999ac19387149e8a2065a9db117e5b0a80fc128b14946f6efa3e216b9119f196d9524740abb12291be87a2d5bf3f2265a2418503f8a221ead389a292285d9

        • memory/2972-18-0x0000000002500000-0x0000000002501000-memory.dmp

          Filesize

          4KB

        • memory/2972-23-0x00000000006A0000-0x00000000007A0000-memory.dmp

          Filesize

          1024KB

        • memory/2972-33-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2972-32-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2972-31-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2972-15-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2972-16-0x00000000006A0000-0x00000000007A0000-memory.dmp

          Filesize

          1024KB

        • memory/2972-17-0x0000000002210000-0x0000000002212000-memory.dmp

          Filesize

          8KB

        • memory/2972-29-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2972-21-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2972-22-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2972-28-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2972-24-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2972-25-0x0000000002500000-0x0000000002501000-memory.dmp

          Filesize

          4KB

        • memory/2972-26-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/2972-27-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/3136-4-0x00000000022B0000-0x00000000022B1000-memory.dmp

          Filesize

          4KB

        • memory/3136-1-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB

        • memory/3136-2-0x00000000006C0000-0x00000000007C0000-memory.dmp

          Filesize

          1024KB

        • memory/3136-3-0x0000000000680000-0x0000000000682000-memory.dmp

          Filesize

          8KB

        • memory/3136-9-0x0000000000400000-0x00000000005F7000-memory.dmp

          Filesize

          2.0MB