Analysis

  • max time kernel
    93s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-02-2024 22:48

General

  • Target

    9334dbb61d19ac21c8f10bcda409a0d0.exe

  • Size

    2.0MB

  • MD5

    9334dbb61d19ac21c8f10bcda409a0d0

  • SHA1

    0a6bab38061f1681bdc259690699ffc284970648

  • SHA256

    0a662bd665b49469f488d81912ae84a7a2506e32a89390134cb0f934b4b57361

  • SHA512

    140da6648af9606443db039a0e976fbe327495c665c64c6c35f617c8fcaf7d34e9becc1c3dcbdb5b377811d66959b5c407b749b136597529f406aebc712e2422

  • SSDEEP

    49152:DgqdwTzUCSaogJDhTp7iK7VwgwV64rnB/FFc2ORZRO5b2BHzv:DPwTzX7JDhtFCgcrn5A2gRqb2Nzv

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9334dbb61d19ac21c8f10bcda409a0d0.exe
    "C:\Users\Admin\AppData\Local\Temp\9334dbb61d19ac21c8f10bcda409a0d0.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:5000
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\518c95wwvsa0z33.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\518c95wwvsa0z33.exe" -e -prvmk09hu8168k0o
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\i9xx8q07h5z9553.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX1\i9xx8q07h5z9553.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3260
        • C:\Users\Admin\AppData\Roaming\Protector-nosp.exe
          C:\Users\Admin\AppData\Roaming\Protector-nosp.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3036
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\I9XX8Q~1.EXE" >> NUL
          4⤵
            PID:1112

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\518c95wwvsa0z33.exe

      Filesize

      2.0MB

      MD5

      d7618a6a91030ee055eba04dc8c8d06f

      SHA1

      5d80031e752801bc16b8ce794a874c112d5ff33c

      SHA256

      4b3106f9be994add13da28563efd7b7de42518b46e0a04319c99fff6cb130168

      SHA512

      2b7166dd17eb2cc558b274527cb19a43e229f30ded063f44043a2f2107d653cb2902ab11a82f8c0ea2e748ed08ea1a6684b802f912bc9d7feccf0a6b2aeb156c

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\518c95wwvsa0z33.exe

      Filesize

      1.0MB

      MD5

      b1f60040c350ea89fe2a3f6ac882c867

      SHA1

      ac527353bb15b2f38eb24d1d46756b0a6fb2be30

      SHA256

      75e819782c940e6e5e41e1d54fcef7970eacdd179966e763236d01e539cd17d1

      SHA512

      c250a9ddf9a0d8586dd25daeedf4a64d6347834039f0fb0b50f7d210b47949b46982cf2c3775782da7f0e76a9dc583c2e583ac952937f36a376951d600bbcd28

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\518c95wwvsa0z33.exe

      Filesize

      474KB

      MD5

      5a6ce4e34458d83ee54d355294641b13

      SHA1

      45d6c2d85eb71e76a0fce320f05c240ca21b2083

      SHA256

      334e94089931ce8f27347551770896751431daca58de754a821dfaae682506de

      SHA512

      dd6d84b3aafb7c3da356f7fbd57e8700e301d37eaa312943269ffd64b7bc1065085b26d369492654928fbdd6003009d31df8e1517a209cc4b520084088b54303

    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\i9xx8q07h5z9553.exe

      Filesize

      1.4MB

      MD5

      07cc4ae56dccc69bbd11e1c2054c0afd

      SHA1

      3fe21ccc00ca2813d2a8c34933403d0e400a6188

      SHA256

      b46cf7c909d6e2517006937e410f21da0fa1719587400169a95247b93789bba6

      SHA512

      9c29f002b067292ab93dd9d3f85ba0b1fb7128618b474c6e4060c985b0edf197f03e1b58e2e7774e6a73060e9ada810f8e9483ce800143016acf069e31309017

    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\i9xx8q07h5z9553.exe

      Filesize

      384KB

      MD5

      6ef73c13d91af818ed4e0231b47f0ea4

      SHA1

      676974935a4ca4c5d5408193d0630d2496721214

      SHA256

      f8b184b54a976d5db247354081ece6e4d24ba91fb00b3e514c94c1fcaa882374

      SHA512

      ebc21ae36d640eb6dfe2a6c68f7eea36d452b8e3a4e7ac4ac9eaf6227b1172185e80db48612bb78fda0d2d8c966b853a3c218c86d6fccf340c97cf36fb73f2d1

    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\i9xx8q07h5z9553.exe

      Filesize

      512KB

      MD5

      a2ad3a54eb5b62818ff599f2924cf706

      SHA1

      22114592dd4aebe4787f951ae996aef0274357d5

      SHA256

      e56876c2f3b7273dd96262a46072c7a514d05086528b2cba8c2dd37f6331c9ba

      SHA512

      67bbff1695fdfe28a7ba6bf44865d68b6dc7ffad09d04764cabb608ffffc35b3a039ae72d24232017a0119c94d01d0b903c203d6f49d03bbdab25f36852b6ded

    • C:\Users\Admin\AppData\Roaming\Protector-nosp.exe

      Filesize

      1.2MB

      MD5

      54e31df4b74de13d2f86c87000faf87e

      SHA1

      a96a1c4dcc582c74c5204adb3558bda0c85b9897

      SHA256

      16ec98c104bb7710443ac13c85f5c3417081fb3bd392b4055d5b65db562c75c4

      SHA512

      c89d4cca2e847f83f6ca331a41100e2dc6de87db9ff9984f737452c5bb258b44987ed5f2b3493673552d74774433607065820782fc1eae0d474b861e3d0fe97e

    • C:\Users\Admin\AppData\Roaming\Protector-nosp.exe

      Filesize

      1.9MB

      MD5

      ba349f4dd6cab4d4aead3b761248622a

      SHA1

      4ef652cf103fbdbbfa16a9cc261ba1f3e1c48997

      SHA256

      b6cc9e59ebfd97150c37ed83e7e5d278a3a69384039ff49be9bf9bc3e44e5b2e

      SHA512

      e6a923ef0abc9c55d6aa408f0d67d86db9773b87e5fabcafa2ab6ae87072832f3e45d75d8605141d465bd39c1ecf2fe73da5dffdd34eeb39ffab85ec822f2c7d

    • memory/3036-107-0x0000000000400000-0x00000000007EA000-memory.dmp

      Filesize

      3.9MB

    • memory/3260-58-0x0000000003930000-0x0000000003931000-memory.dmp

      Filesize

      4KB

    • memory/3260-52-0x00000000038C0000-0x00000000038C1000-memory.dmp

      Filesize

      4KB

    • memory/3260-22-0x00000000026F0000-0x00000000026F1000-memory.dmp

      Filesize

      4KB

    • memory/3260-21-0x0000000002700000-0x0000000002701000-memory.dmp

      Filesize

      4KB

    • memory/3260-20-0x00000000026B0000-0x00000000026B1000-memory.dmp

      Filesize

      4KB

    • memory/3260-23-0x0000000002820000-0x0000000002821000-memory.dmp

      Filesize

      4KB

    • memory/3260-24-0x00000000026D0000-0x00000000026D1000-memory.dmp

      Filesize

      4KB

    • memory/3260-25-0x0000000002690000-0x0000000002691000-memory.dmp

      Filesize

      4KB

    • memory/3260-27-0x0000000003610000-0x0000000003612000-memory.dmp

      Filesize

      8KB

    • memory/3260-47-0x0000000003860000-0x0000000003861000-memory.dmp

      Filesize

      4KB

    • memory/3260-68-0x0000000003E10000-0x0000000003E11000-memory.dmp

      Filesize

      4KB

    • memory/3260-71-0x0000000004360000-0x0000000004361000-memory.dmp

      Filesize

      4KB

    • memory/3260-75-0x0000000004370000-0x0000000004371000-memory.dmp

      Filesize

      4KB

    • memory/3260-74-0x0000000004350000-0x0000000004351000-memory.dmp

      Filesize

      4KB

    • memory/3260-73-0x0000000004320000-0x0000000004321000-memory.dmp

      Filesize

      4KB

    • memory/3260-72-0x00000000036A0000-0x00000000036A1000-memory.dmp

      Filesize

      4KB

    • memory/3260-70-0x0000000004340000-0x0000000004341000-memory.dmp

      Filesize

      4KB

    • memory/3260-69-0x0000000004310000-0x0000000004311000-memory.dmp

      Filesize

      4KB

    • memory/3260-67-0x0000000003E40000-0x0000000003E41000-memory.dmp

      Filesize

      4KB

    • memory/3260-66-0x0000000003E20000-0x0000000003E21000-memory.dmp

      Filesize

      4KB

    • memory/3260-65-0x0000000003E30000-0x0000000003E31000-memory.dmp

      Filesize

      4KB

    • memory/3260-64-0x0000000003DF0000-0x0000000003DF1000-memory.dmp

      Filesize

      4KB

    • memory/3260-63-0x0000000003E00000-0x0000000003E01000-memory.dmp

      Filesize

      4KB

    • memory/3260-62-0x0000000003DD0000-0x0000000003DD1000-memory.dmp

      Filesize

      4KB

    • memory/3260-61-0x0000000003C80000-0x0000000003C81000-memory.dmp

      Filesize

      4KB

    • memory/3260-60-0x0000000003C90000-0x0000000003C91000-memory.dmp

      Filesize

      4KB

    • memory/3260-59-0x0000000003920000-0x0000000003921000-memory.dmp

      Filesize

      4KB

    • memory/3260-18-0x0000000000400000-0x00000000007EA000-memory.dmp

      Filesize

      3.9MB

    • memory/3260-57-0x00000000038F0000-0x00000000038F1000-memory.dmp

      Filesize

      4KB

    • memory/3260-56-0x0000000003900000-0x0000000003901000-memory.dmp

      Filesize

      4KB

    • memory/3260-55-0x00000000038D0000-0x00000000038D1000-memory.dmp

      Filesize

      4KB

    • memory/3260-54-0x00000000038E0000-0x00000000038E1000-memory.dmp

      Filesize

      4KB

    • memory/3260-53-0x00000000038B0000-0x00000000038B1000-memory.dmp

      Filesize

      4KB

    • memory/3260-19-0x00000000025E0000-0x000000000263A000-memory.dmp

      Filesize

      360KB

    • memory/3260-51-0x0000000003890000-0x0000000003891000-memory.dmp

      Filesize

      4KB

    • memory/3260-50-0x00000000038A0000-0x00000000038A1000-memory.dmp

      Filesize

      4KB

    • memory/3260-49-0x0000000003870000-0x0000000003871000-memory.dmp

      Filesize

      4KB

    • memory/3260-48-0x0000000003850000-0x0000000003851000-memory.dmp

      Filesize

      4KB

    • memory/3260-46-0x0000000003830000-0x0000000003831000-memory.dmp

      Filesize

      4KB

    • memory/3260-45-0x0000000003840000-0x0000000003841000-memory.dmp

      Filesize

      4KB

    • memory/3260-44-0x0000000003810000-0x0000000003811000-memory.dmp

      Filesize

      4KB

    • memory/3260-76-0x0000000004390000-0x0000000004391000-memory.dmp

      Filesize

      4KB

    • memory/3260-81-0x00000000043C0000-0x00000000043C1000-memory.dmp

      Filesize

      4KB

    • memory/3260-80-0x00000000043D0000-0x00000000043D1000-memory.dmp

      Filesize

      4KB

    • memory/3260-79-0x00000000043A0000-0x00000000043A1000-memory.dmp

      Filesize

      4KB

    • memory/3260-77-0x0000000004380000-0x0000000004381000-memory.dmp

      Filesize

      4KB

    • memory/3260-78-0x00000000043B0000-0x00000000043B1000-memory.dmp

      Filesize

      4KB

    • memory/3260-43-0x0000000003820000-0x0000000003821000-memory.dmp

      Filesize

      4KB

    • memory/3260-42-0x00000000036B0000-0x00000000036B1000-memory.dmp

      Filesize

      4KB

    • memory/3260-41-0x00000000036C0000-0x00000000036C1000-memory.dmp

      Filesize

      4KB

    • memory/3260-40-0x0000000003690000-0x0000000003691000-memory.dmp

      Filesize

      4KB

    • memory/3260-39-0x0000000003670000-0x0000000003671000-memory.dmp

      Filesize

      4KB

    • memory/3260-38-0x0000000003680000-0x0000000003681000-memory.dmp

      Filesize

      4KB

    • memory/3260-37-0x0000000002A40000-0x0000000002A41000-memory.dmp

      Filesize

      4KB

    • memory/3260-36-0x00000000028E0000-0x00000000028E1000-memory.dmp

      Filesize

      4KB

    • memory/3260-35-0x0000000002990000-0x0000000002991000-memory.dmp

      Filesize

      4KB

    • memory/3260-34-0x0000000003630000-0x0000000003631000-memory.dmp

      Filesize

      4KB

    • memory/3260-33-0x00000000008E0000-0x00000000008E1000-memory.dmp

      Filesize

      4KB

    • memory/3260-32-0x00000000008D0000-0x00000000008D1000-memory.dmp

      Filesize

      4KB

    • memory/3260-31-0x0000000002830000-0x0000000002831000-memory.dmp

      Filesize

      4KB

    • memory/3260-30-0x0000000002670000-0x0000000002671000-memory.dmp

      Filesize

      4KB

    • memory/3260-29-0x0000000003660000-0x0000000003661000-memory.dmp

      Filesize

      4KB

    • memory/3260-28-0x0000000003880000-0x0000000003881000-memory.dmp

      Filesize

      4KB

    • memory/3260-26-0x0000000003620000-0x0000000003621000-memory.dmp

      Filesize

      4KB

    • memory/3260-105-0x0000000000400000-0x00000000007EA000-memory.dmp

      Filesize

      3.9MB