Analysis

  • max time kernel
    141s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2024 02:00

General

  • Target

    1cbf582e2373ae4d763d3aec85107170658fc1ee11ee2e0f92995fb3df1f8e38.exe

  • Size

    89KB

  • MD5

    50f94c38afce367dd0d2fb4f19226809

  • SHA1

    fb7606bb2a783ad57a91adb7ee3ceee265e8ced1

  • SHA256

    1cbf582e2373ae4d763d3aec85107170658fc1ee11ee2e0f92995fb3df1f8e38

  • SHA512

    5e2290a3073cd9242de8182a605d635ad568c62b8a81ff08e32edf000050a19a6029e7ccc94073469e28df1b8ff16473da894d4c57229220c5fb1d188fe693de

  • SSDEEP

    1536:b6K0lmk92xYvOl6w2K3z5NeVpke07YbCPmcg6ZH7qfLcb3Z6dHYD7rIenvviyIe4:erEavuD/wkOCP5g6Zb+Q3Z6dHYD7rBvU

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cbf582e2373ae4d763d3aec85107170658fc1ee11ee2e0f92995fb3df1f8e38.exe
    "C:\Users\Admin\AppData\Local\Temp\1cbf582e2373ae4d763d3aec85107170658fc1ee11ee2e0f92995fb3df1f8e38.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden -NoProfile -NonInteractive -Command "Start-Sleep 2; Remove-Item '' -Force -Recurse"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_0atadc4i.qki.ps1

    Filesize

    60B

    MD5

    d17fe0a3f47be24a6453e9ef58c94641

    SHA1

    6ab83620379fc69f80c0242105ddffd7d98d5d9d

    SHA256

    96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

    SHA512

    5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

  • memory/1604-6-0x00007FFE343D0000-0x00007FFE34E91000-memory.dmp

    Filesize

    10.8MB

  • memory/1604-16-0x000001ECBD180000-0x000001ECBD190000-memory.dmp

    Filesize

    64KB

  • memory/1604-17-0x000001ECA4D80000-0x000001ECA4DA2000-memory.dmp

    Filesize

    136KB

  • memory/1604-18-0x000001ECBD180000-0x000001ECBD190000-memory.dmp

    Filesize

    64KB

  • memory/1604-19-0x000001ECBD180000-0x000001ECBD190000-memory.dmp

    Filesize

    64KB

  • memory/1604-22-0x00007FFE343D0000-0x00007FFE34E91000-memory.dmp

    Filesize

    10.8MB

  • memory/2604-0-0x000002D143AF0000-0x000002D143B0C000-memory.dmp

    Filesize

    112KB

  • memory/2604-1-0x000002D143ED0000-0x000002D143EDA000-memory.dmp

    Filesize

    40KB

  • memory/2604-3-0x00007FFE343D0000-0x00007FFE34E91000-memory.dmp

    Filesize

    10.8MB

  • memory/2604-23-0x00007FFE343D0000-0x00007FFE34E91000-memory.dmp

    Filesize

    10.8MB