Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/01/2024, 09:11

General

  • Target

    7f743bf03266282eddbe781afd0e49b0.exe

  • Size

    78KB

  • MD5

    7f743bf03266282eddbe781afd0e49b0

  • SHA1

    b875eb4fdde070effa1d6c548690cbf88e11b0df

  • SHA256

    395fb8930edd7a8fe7d26546d4a6ec6a1b04dc80832751f48e834af97a00bf6f

  • SHA512

    3b4f252d6f229e30b68bb2735c3ac57956b7417aba0ac235358ab6e17764f7637ff6825bda126128b1d380b33df34784036d932fb355ea2740e467695f6c570b

  • SSDEEP

    1536:+5tdy0MochZDsC8Kl/99Z242UdIAkn3jKZPjoYaoQtC679/I112e:+54n7N041Qqhgz9/Ih

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f743bf03266282eddbe781afd0e49b0.exe
    "C:\Users\Admin\AppData\Local\Temp\7f743bf03266282eddbe781afd0e49b0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\vmihzwkt.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1320
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESE24.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1CEC2480B1614999A9FBD4E32DB81B.TMP"
        3⤵
          PID:4836
      • C:\Users\Admin\AppData\Local\Temp\tmpB26.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmpB26.tmp.exe" C:\Users\Admin\AppData\Local\Temp\7f743bf03266282eddbe781afd0e49b0.exe
        2⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2596

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\RESE24.tmp

            Filesize

            1KB

            MD5

            d20a30f1434d17928e80e3ba94d1601d

            SHA1

            486809560d970585ae7d180052bacead0f4299c6

            SHA256

            ebca9fa4bcba1d9c1d671760b8c2cbedac47dc5b0eab775fe5482851d9bc1a7b

            SHA512

            0b6b2ea560a1a4d61ebbe3ccb45b902c4a894a54fb70a05d5be0d0556c0bdcacdce7b347ca8b71def2e9e6d6ad66302f424d7b5fad4818bb9b5bf564fdfad966

          • C:\Users\Admin\AppData\Local\Temp\tmpB26.tmp.exe

            Filesize

            78KB

            MD5

            447b639622bb01cbcd3c8486f9479f19

            SHA1

            26eb8b1ede23b8aa2a6e7691fd651bb84e9f3469

            SHA256

            1de8e6e9a195ffe097e2bd217587399767a4242d5194cbde5869fd9afbbbb972

            SHA512

            8c294ab73c828062e2d42733aa3be938b97538d2707a301f9e7e9b1b9348fecad0f3caf3ff381578ac0bd5f8e2472b76d96fd23ec5231077a86841215f22759d

          • C:\Users\Admin\AppData\Local\Temp\vbc1CEC2480B1614999A9FBD4E32DB81B.TMP

            Filesize

            660B

            MD5

            9d80e92c4001247354e8ae5c0ead22c5

            SHA1

            68163865a5e279639c9674c5a3b8ebcaa2073c5c

            SHA256

            9aa59aa43d668eed4222ab481d55238a5bf60591234df5b56145dc23628bf658

            SHA512

            9c25a7d56b8408348c08ac66211f9ff263412cf8253e3e0744a3ac54bc731ee7b372c4f07155da2e1e343cae2b341ffcd269662d4b5610dd341b64db30c5fd73

          • C:\Users\Admin\AppData\Local\Temp\vmihzwkt.0.vb

            Filesize

            14KB

            MD5

            37c42cde32272d3e5a5d0265bcf9ad91

            SHA1

            de30f619f4352748408eab8fea59232f08909df2

            SHA256

            0be9e829fdf8a95397c7a09e8e5e58491d429a415cfdc470ad94f1996f2bf3e2

            SHA512

            76ca62c36d85b446d097fb26f991aede8020244a34685785a2128fa5b02790c75cf7ef7608fa343d7c2382eee8da711ef29261d252e388e7fa91422b8342bf78

          • C:\Users\Admin\AppData\Local\Temp\vmihzwkt.cmdline

            Filesize

            265B

            MD5

            4c009b779d526e2b1098aa8b957d54e3

            SHA1

            9734342b78577edaec8dbafb07ab7845bf1c6e6a

            SHA256

            584b7ecfcde0229dbb77f43e8ccb77cdecde64c769d120d95743d3ea1eae6bed

            SHA512

            e2b64ad697428710506029d0fcac4c30d454e9ba5047e1890480027cff7cda44779dc3cd1b4bf931b50084ad3ed86c88e137f2869ae1f76f7894fb659079f64f

          • C:\Users\Admin\AppData\Local\Temp\zCom.resources

            Filesize

            62KB

            MD5

            aa4bdac8c4e0538ec2bb4b7574c94192

            SHA1

            ef76d834232b67b27ebd75708922adea97aeacce

            SHA256

            d7dbe167a7b64a4d11e76d172c8c880020fe7e4bc9cae977ac06982584a6b430

            SHA512

            0ec342286c9dbe78dd7a371afaf405232ff6242f7e024c6640b265ba2288771297edbb5a6482848daad5007aef503e92508f1a7e1a8b8ff3fe20343b21421a65

          • memory/2012-0-0x0000000074CF0000-0x00000000752A1000-memory.dmp

            Filesize

            5.7MB

          • memory/2012-2-0x00000000012A0000-0x00000000012B0000-memory.dmp

            Filesize

            64KB

          • memory/2012-1-0x0000000074CF0000-0x00000000752A1000-memory.dmp

            Filesize

            5.7MB

          • memory/2012-20-0x0000000074CF0000-0x00000000752A1000-memory.dmp

            Filesize

            5.7MB

          • memory/2596-21-0x0000000074CF0000-0x00000000752A1000-memory.dmp

            Filesize

            5.7MB

          • memory/2596-22-0x0000000074CF0000-0x00000000752A1000-memory.dmp

            Filesize

            5.7MB

          • memory/2596-23-0x0000000000B60000-0x0000000000B70000-memory.dmp

            Filesize

            64KB

          • memory/2596-25-0x0000000000B60000-0x0000000000B70000-memory.dmp

            Filesize

            64KB

          • memory/2596-26-0x0000000074CF0000-0x00000000752A1000-memory.dmp

            Filesize

            5.7MB

          • memory/2596-27-0x0000000074CF0000-0x00000000752A1000-memory.dmp

            Filesize

            5.7MB

          • memory/2596-28-0x0000000000B60000-0x0000000000B70000-memory.dmp

            Filesize

            64KB

          • memory/2596-29-0x0000000000B60000-0x0000000000B70000-memory.dmp

            Filesize

            64KB