Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13/02/2024, 05:54

General

  • Target

    edeb7fa25c34426f14f1a4fe13bdcd7b0f3a3d6291e6ca883fe7b9a7503d622d.exe

  • Size

    14KB

  • MD5

    a89f5a781a4d5153ca31ed64ce27b379

  • SHA1

    1a3732ebede98e63d6e95d8634d11728eca61c29

  • SHA256

    edeb7fa25c34426f14f1a4fe13bdcd7b0f3a3d6291e6ca883fe7b9a7503d622d

  • SHA512

    acaaefb81e8c4305cf3c400d0066117208bc3b8266ddc0f05013a1bc6426ca7b8e7132ed6469dd7920fdb4b591ae087a9e79b5af7241a52a9242331f1bed2b74

  • SSDEEP

    384:dQ8wvUmai/zbM/XygkxOu6cyhLWqYv1fdlSW:djkUHi7blHhyhi9R

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\edeb7fa25c34426f14f1a4fe13bdcd7b0f3a3d6291e6ca883fe7b9a7503d622d.exe
    "C:\Users\Admin\AppData\Local\Temp\edeb7fa25c34426f14f1a4fe13bdcd7b0f3a3d6291e6ca883fe7b9a7503d622d.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Adds Run key to start application
    • Checks whether UAC is enabled
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3304
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\edeb7fa25c34426f14f1a4fe13bdcd7b0f3a3d6291e6ca883fe7b9a7503d622d.exe'; Add-MpPreference -ExclusionProcess 'edeb7fa25c34426f14f1a4fe13bdcd7b0f3a3d6291e6ca883fe7b9a7503d622d'; Add-MpPreference -ExclusionPath 'C:\Windows'; Add-MpPreference -ExclusionPath 'C:\Users\Admin'"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3396

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_xip5xwm0.yrv.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/3304-0-0x0000000000A10000-0x0000000000A1A000-memory.dmp

          Filesize

          40KB

        • memory/3304-1-0x00000000752D0000-0x0000000075A80000-memory.dmp

          Filesize

          7.7MB

        • memory/3304-2-0x0000000005A60000-0x0000000006004000-memory.dmp

          Filesize

          5.6MB

        • memory/3304-3-0x00000000053F0000-0x0000000005482000-memory.dmp

          Filesize

          584KB

        • memory/3304-55-0x00000000053A0000-0x00000000053B0000-memory.dmp

          Filesize

          64KB

        • memory/3304-54-0x00000000053A0000-0x00000000053B0000-memory.dmp

          Filesize

          64KB

        • memory/3304-53-0x00000000053A0000-0x00000000053B0000-memory.dmp

          Filesize

          64KB

        • memory/3304-51-0x0000000006580000-0x000000000658A000-memory.dmp

          Filesize

          40KB

        • memory/3304-50-0x00000000053A0000-0x00000000053B0000-memory.dmp

          Filesize

          64KB

        • memory/3304-49-0x00000000752D0000-0x0000000075A80000-memory.dmp

          Filesize

          7.7MB

        • memory/3396-35-0x0000000006070000-0x000000000608E000-memory.dmp

          Filesize

          120KB

        • memory/3396-41-0x0000000006FD0000-0x0000000006FE1000-memory.dmp

          Filesize

          68KB

        • memory/3396-21-0x0000000005AB0000-0x0000000005ACE000-memory.dmp

          Filesize

          120KB

        • memory/3396-22-0x0000000005B10000-0x0000000005B5C000-memory.dmp

          Filesize

          304KB

        • memory/3396-23-0x0000000004780000-0x0000000004790000-memory.dmp

          Filesize

          64KB

        • memory/3396-24-0x0000000006090000-0x00000000060C2000-memory.dmp

          Filesize

          200KB

        • memory/3396-25-0x0000000070880000-0x00000000708CC000-memory.dmp

          Filesize

          304KB

        • memory/3396-12-0x0000000005460000-0x00000000054C6000-memory.dmp

          Filesize

          408KB

        • memory/3396-36-0x0000000006AC0000-0x0000000006B63000-memory.dmp

          Filesize

          652KB

        • memory/3396-37-0x0000000007410000-0x0000000007A8A000-memory.dmp

          Filesize

          6.5MB

        • memory/3396-38-0x0000000006DD0000-0x0000000006DEA000-memory.dmp

          Filesize

          104KB

        • memory/3396-39-0x0000000006E40000-0x0000000006E4A000-memory.dmp

          Filesize

          40KB

        • memory/3396-40-0x0000000007050000-0x00000000070E6000-memory.dmp

          Filesize

          600KB

        • memory/3396-20-0x0000000005730000-0x0000000005A84000-memory.dmp

          Filesize

          3.3MB

        • memory/3396-42-0x0000000007000000-0x000000000700E000-memory.dmp

          Filesize

          56KB

        • memory/3396-43-0x0000000007010000-0x0000000007024000-memory.dmp

          Filesize

          80KB

        • memory/3396-44-0x0000000007110000-0x000000000712A000-memory.dmp

          Filesize

          104KB

        • memory/3396-45-0x00000000070F0000-0x00000000070F8000-memory.dmp

          Filesize

          32KB

        • memory/3396-48-0x00000000752D0000-0x0000000075A80000-memory.dmp

          Filesize

          7.7MB

        • memory/3396-9-0x00000000053F0000-0x0000000005456000-memory.dmp

          Filesize

          408KB

        • memory/3396-8-0x0000000004BF0000-0x0000000004C12000-memory.dmp

          Filesize

          136KB

        • memory/3396-7-0x0000000004DC0000-0x00000000053E8000-memory.dmp

          Filesize

          6.2MB

        • memory/3396-6-0x0000000004780000-0x0000000004790000-memory.dmp

          Filesize

          64KB

        • memory/3396-5-0x00000000752D0000-0x0000000075A80000-memory.dmp

          Filesize

          7.7MB

        • memory/3396-4-0x00000000024C0000-0x00000000024F6000-memory.dmp

          Filesize

          216KB