Analysis

  • max time kernel
    139s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-01-2024 09:52

General

  • Target

    71ea2bdbb9d73538dd4ca5ea74d11754.exe

  • Size

    574KB

  • MD5

    71ea2bdbb9d73538dd4ca5ea74d11754

  • SHA1

    8092886f01a74b59d86e18d0def00b5593ce17e8

  • SHA256

    16606e8c9ede6fa6e5e2eba35adacd4a8b59f6096361acf31aa48943eef015c3

  • SHA512

    4d3b2b55440cd60357d46106b7addea223e85ecc82ed4993c7af0e3f8ceb2e07a5218ebcdf963f78371a71fd364d822dfc87603a4b1a31129ea84c5ff6a07280

  • SSDEEP

    12288:dDzaKlirFT0cD8lR77JAaM3auKvokDKTpYKmx8iBQaAm:dDzP0FTxPCkGKcPiK

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\71ea2bdbb9d73538dd4ca5ea74d11754.exe
    "C:\Users\Admin\AppData\Local\Temp\71ea2bdbb9d73538dd4ca5ea74d11754.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks computer location settings
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1604
    • C:\Users\Admin\AppData\Local\Temp\n5530\s5530.exe
      "C:\Users\Admin\AppData\Local\Temp\n5530\s5530.exe" /u 53747c9e-b4dc-48b2-845f-0a0d0a000013 /h 6d77.api.socdn.com /e 12742611 /v "C:\Users\Admin\AppData\Local\Temp\71ea2bdbb9d73538dd4ca5ea74d11754.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:3256
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 3820
      2⤵
      • Program crash
      PID:4800
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 1604 -ip 1604
    1⤵
      PID:4680

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\n5530\s5530.exe

      Filesize

      355KB

      MD5

      827273c6e70f13af757ef17c6f653ade

      SHA1

      94fb9c0c54bafc7c4d42de346cb7da1dcf9fa78a

      SHA256

      b8f73d6e26a6c95d5087046bd2030b856c6d87f10e4c9a9d85fb6821661f0b7f

      SHA512

      f1f864a02820113d6a5559c58be13892e00b9e21161c6e12bfd9c26249de4f67d640c9ff54d7699a0854a8dc0f38ee49a587d4714f14971383f5502bb32f6251

    • memory/3256-14-0x00007FFEA6C00000-0x00007FFEA75A1000-memory.dmp

      Filesize

      9.6MB

    • memory/3256-16-0x00000000009F0000-0x0000000000A00000-memory.dmp

      Filesize

      64KB

    • memory/3256-15-0x00007FFEA6C00000-0x00007FFEA75A1000-memory.dmp

      Filesize

      9.6MB

    • memory/3256-35-0x000000001B560000-0x000000001B574000-memory.dmp

      Filesize

      80KB

    • memory/3256-39-0x000000001C520000-0x000000001C5BC000-memory.dmp

      Filesize

      624KB

    • memory/3256-38-0x000000001BFB0000-0x000000001C47E000-memory.dmp

      Filesize

      4.8MB

    • memory/3256-40-0x000000001C680000-0x000000001C6E2000-memory.dmp

      Filesize

      392KB

    • memory/3256-41-0x00000000009F0000-0x0000000000A00000-memory.dmp

      Filesize

      64KB

    • memory/3256-42-0x00000000009F0000-0x0000000000A00000-memory.dmp

      Filesize

      64KB

    • memory/3256-43-0x000000001B550000-0x000000001B558000-memory.dmp

      Filesize

      32KB

    • memory/3256-44-0x00000000009F0000-0x0000000000A00000-memory.dmp

      Filesize

      64KB

    • memory/3256-45-0x00000000009F0000-0x0000000000A00000-memory.dmp

      Filesize

      64KB

    • memory/3256-46-0x00000000009F0000-0x0000000000A00000-memory.dmp

      Filesize

      64KB

    • memory/3256-47-0x00000000009F0000-0x0000000000A00000-memory.dmp

      Filesize

      64KB

    • memory/3256-48-0x000000001FC70000-0x000000001FDAC000-memory.dmp

      Filesize

      1.2MB

    • memory/3256-49-0x00000000202C0000-0x00000000207CE000-memory.dmp

      Filesize

      5.1MB

    • memory/3256-50-0x0000000020BD0000-0x0000000020CD0000-memory.dmp

      Filesize

      1024KB

    • memory/3256-51-0x0000000020BD0000-0x0000000020CD0000-memory.dmp

      Filesize

      1024KB

    • memory/3256-52-0x00007FFEA6C00000-0x00007FFEA75A1000-memory.dmp

      Filesize

      9.6MB

    • memory/3256-54-0x00007FFEA6C00000-0x00007FFEA75A1000-memory.dmp

      Filesize

      9.6MB