Analysis

  • max time kernel
    142s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/02/2024, 16:32

General

  • Target

    6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe

  • Size

    196KB

  • MD5

    bf7bd7bfb88531b7e2ed9596c9a32365

  • SHA1

    3bdf46175bd5ee1f13084d726254fd1ec0d6cef8

  • SHA256

    6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0

  • SHA512

    bf321c40d8034b4631b417f351334cac0be3b8700cbe5fd6f97eb68d60b6c8ab2b1197ffbdfa4f22db4573ee7d9ca312cb1e946e23624e1a0e0e261f0477b5db

  • SSDEEP

    6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOn:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXu

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe
    "C:\Users\Admin\AppData\Local\Temp\6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3832
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\6B8461~1.EXE > nul
      2⤵
        PID:2036
    • C:\Windows\Debug\xsqhost.exe
      C:\Windows\Debug\xsqhost.exe
      1⤵
      • Executes dropped EXE
      • Checks processor information in registry
      PID:4588

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\debug\xsqhost.exe

            Filesize

            196KB

            MD5

            e21b2fa0480c9de49161b8ba076df6df

            SHA1

            48141c17a40ff103fe1b5533ee5a7a0919b48bff

            SHA256

            350429ceb57048bacc434863242978344b34086ebdba4f471a14a45283469e48

            SHA512

            21297faa7e8da520879c8c22328643df25ae58c1ed8c0758bc5726adb1ac31d7b57cb9f68e8f043870c71ca629566f29fc1efbcea795e20300f1cba3bbfb84db