Analysis

  • max time kernel
    136s
  • max time network
    158s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-02-2024 03:17

General

  • Target

    93af744fa95d6ead692424cbbab3e8e5.exe

  • Size

    2.0MB

  • MD5

    93af744fa95d6ead692424cbbab3e8e5

  • SHA1

    286b3ddd319bd8d5e49db6675ff6dada73d86930

  • SHA256

    622d580dc26dc81d0d9a4c0a396db513737e7237d166e2b6c1d9a66fa71821e9

  • SHA512

    d4097194ffe68f31412756551c0f154f15ad6fdaa3e485a6b4815eb64f546bc0884541129f64ed5cb46e6bdefb724749c065f3bb7622799611adf111d9ebfdfc

  • SSDEEP

    49152:r8cUfZsF6GWhsesortO2FAZ8mlQuR7Djfan3zIEUttrx7H2:r8XxxGWhDjWDQ+QoDx2

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 33 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\93af744fa95d6ead692424cbbab3e8e5.exe
    "C:\Users\Admin\AppData\Local\Temp\93af744fa95d6ead692424cbbab3e8e5.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4080
    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\5ke5w833eo7e9wm.exe
      "C:\Users\Admin\AppData\Local\Temp\RarSFX0\5ke5w833eo7e9wm.exe" -e -pe17js56fq1jh4vq
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1756
      • C:\Users\Admin\AppData\Local\Temp\RarSFX1\6eqxwk49u166oll.exe
        "C:\Users\Admin\AppData\Local\Temp\RarSFX1\6eqxwk49u166oll.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Modifies registry class
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1256
        • C:\Users\Admin\AppData\Roaming\Protector-ruqc.exe
          C:\Users\Admin\AppData\Roaming\Protector-ruqc.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:4064
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\RarSFX1\6EQXWK~1.EXE" >> NUL
          4⤵
            PID:4424

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\5ke5w833eo7e9wm.exe
      Filesize

      1.9MB

      MD5

      8666dfab99a3fce2ea7a918b066e65aa

      SHA1

      543bc086ecd3385f1fc318d9b0ee0e25826b9461

      SHA256

      5a006ca284cfcc4943936eed87e8a3bf4c7c88f62ca0fa0886f668ab334dbfa5

      SHA512

      a3b286394b2c752e67a7f68b56c3e9d00fccba2c97940a9c3dafd480a30f2129cf6936ed18ef51ca692aa025481fff94e46f983bc2351023f0b1b1495604fa8e

    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\6eqxwk49u166oll.exe
      Filesize

      1.8MB

      MD5

      136ab618780fb3403e2dcc821304df9f

      SHA1

      02d6c8f4666ec537e5b3a18e9b6524b352aff7c2

      SHA256

      854970158c1514690772a753fdaed4662ece99019f83c2cb6139765b8b02fd7e

      SHA512

      889825d9ec2906b067f20a8194863e3f88ebaf7a65462b0deecee52fba4ae786677403e3cf4d685775437960114a449ed9d57a180b0e96cdbfe25b0466c9eeb8

    • memory/1256-35-0x0000000000990000-0x0000000000991000-memory.dmp
      Filesize

      4KB

    • memory/1256-32-0x00000000035F0000-0x00000000035F2000-memory.dmp
      Filesize

      8KB

    • memory/1256-21-0x0000000000400000-0x00000000007D9000-memory.dmp
      Filesize

      3.8MB

    • memory/1256-26-0x00000000027D0000-0x00000000027D1000-memory.dmp
      Filesize

      4KB

    • memory/1256-27-0x00000000027A0000-0x00000000027A1000-memory.dmp
      Filesize

      4KB

    • memory/1256-24-0x0000000002770000-0x0000000002771000-memory.dmp
      Filesize

      4KB

    • memory/1256-28-0x00000000027F0000-0x00000000027F1000-memory.dmp
      Filesize

      4KB

    • memory/1256-29-0x0000000003610000-0x0000000003611000-memory.dmp
      Filesize

      4KB

    • memory/1256-30-0x0000000003600000-0x0000000003602000-memory.dmp
      Filesize

      8KB

    • memory/1256-23-0x0000000002780000-0x0000000002781000-memory.dmp
      Filesize

      4KB

    • memory/1256-31-0x0000000003650000-0x0000000003651000-memory.dmp
      Filesize

      4KB

    • memory/1256-49-0x0000000000400000-0x00000000007D9000-memory.dmp
      Filesize

      3.8MB

    • memory/1256-33-0x0000000003660000-0x0000000003661000-memory.dmp
      Filesize

      4KB

    • memory/1256-34-0x00000000008B0000-0x00000000008B1000-memory.dmp
      Filesize

      4KB

    • memory/1256-25-0x0000000002760000-0x0000000002761000-memory.dmp
      Filesize

      4KB

    • memory/1256-37-0x0000000003620000-0x0000000003621000-memory.dmp
      Filesize

      4KB

    • memory/1256-22-0x0000000000A00000-0x0000000000A5A000-memory.dmp
      Filesize

      360KB

    • memory/1256-38-0x0000000003630000-0x0000000003631000-memory.dmp
      Filesize

      4KB

    • memory/1256-39-0x00000000028C0000-0x00000000028C1000-memory.dmp
      Filesize

      4KB

    • memory/1256-36-0x0000000003640000-0x0000000003641000-memory.dmp
      Filesize

      4KB

    • memory/1256-53-0x0000000000A00000-0x0000000000A5A000-memory.dmp
      Filesize

      360KB

    • memory/1256-46-0x0000000000400000-0x00000000007D9000-memory.dmp
      Filesize

      3.8MB

    • memory/4064-52-0x00000000034F0000-0x00000000034F2000-memory.dmp
      Filesize

      8KB

    • memory/4064-48-0x0000000003770000-0x0000000003771000-memory.dmp
      Filesize

      4KB

    • memory/4064-47-0x0000000003510000-0x0000000003511000-memory.dmp
      Filesize

      4KB

    • memory/4064-50-0x0000000003550000-0x0000000003551000-memory.dmp
      Filesize

      4KB

    • memory/4064-51-0x0000000000400000-0x00000000007D9000-memory.dmp
      Filesize

      3.8MB

    • memory/4064-54-0x0000000002320000-0x000000000237A000-memory.dmp
      Filesize

      360KB

    • memory/4064-55-0x0000000003560000-0x0000000003561000-memory.dmp
      Filesize

      4KB

    • memory/4064-45-0x0000000002320000-0x000000000237A000-memory.dmp
      Filesize

      360KB

    • memory/4064-44-0x0000000000400000-0x00000000007D9000-memory.dmp
      Filesize

      3.8MB