Analysis

  • max time kernel
    164s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24/02/2024, 20:43

General

  • Target

    a2b63d9a2848033bc8f0bfeb3cbeacd2.exe

  • Size

    332KB

  • MD5

    a2b63d9a2848033bc8f0bfeb3cbeacd2

  • SHA1

    d802296f700432f7da660840fe19f2c82a1ed6db

  • SHA256

    5c877175974a5fd36d27ce10fc0ca70aa20555779c6098b19d35431575f57dc0

  • SHA512

    2ce892a16e40d48e4122989efc3fc8b7d844109e94f1141a82f309081eae9e7437ddbbc13c5d4e38ced75a07c8071835a796c91306bf4b2cbb7a229409e56485

  • SSDEEP

    6144:3cWMJJhqryYP/daqmhzya865UMlFSwJ91gVMHTBYcSojEVWS5IvaIr:3czJJhqrVPlKwaoMlEmuKTBFljq5KaIr

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a2b63d9a2848033bc8f0bfeb3cbeacd2.exe
    "C:\Users\Admin\AppData\Local\Temp\a2b63d9a2848033bc8f0bfeb3cbeacd2.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4972
    • C:\Users\Admin\AppData\Local\Temp\123.exe
      "C:\Users\Admin\AppData\Local\Temp\123.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:1404
    • C:\Users\Admin\AppData\Local\Temp\asd.exe
      "C:\Users\Admin\AppData\Local\Temp\asd.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Users\Admin\AppData\Local\Temp\asd.exe
        C:\Users\Admin\AppData\Local\Temp\asd.exe
        3⤵
          PID:3336

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\123.exe

      Filesize

      316KB

      MD5

      4505ec35dc42664b86dd3cac8199d4d8

      SHA1

      b3532878202943ab221ebc0cbb318b9829403391

      SHA256

      48077e97abafe0c7c33ab5371416d745e5fe7967b5980ffeb3a1d1150053bdf3

      SHA512

      05a5bb9830e832ca05cb5f043a449d80e511589a2f159a40233ff236405c3cf5893b016c629ca6f235ae9234cc6bdfdda0c912ff788c5db318345d6d5913b5f6

    • C:\Users\Admin\AppData\Local\Temp\Language\English.lang

      Filesize

      2KB

      MD5

      63d8d7d597bc262644d9147bd4983e32

      SHA1

      18d08e1b59af89b02a94f668b7102d9851178410

      SHA256

      32cb2a88ab9d41d10575932947bdf8d7980ba1f3c7c9518f9a6167fceb49d7bf

      SHA512

      9cb69feb0ad2d773115df65da61a467b2e89fbe390121a785567bb85459c965a191cfc75b077c32424109e315dba5c6ef3606356885c6abae0b67cf53421c1ad

    • C:\Users\Admin\AppData\Local\Temp\asd.exe

      Filesize

      250KB

      MD5

      02eb637e08b5466caef64698cae0b1e2

      SHA1

      c1718e569d3305103890eeb0a1fe38d587f657f9

      SHA256

      b28c73d69d32272a4c6b507796794381a991550b742089fddf6ea4b6e9ee20d8

      SHA512

      370317f3d615fcd404f535bdf2bf2880cf2087835b1b121988b146b4a1fb4ea5c71ad02e591113d554e09340d795cfe499b561c6487852a73237f137fa61f3c4

    • memory/2656-27-0x0000000074350000-0x0000000074901000-memory.dmp

      Filesize

      5.7MB

    • memory/2656-28-0x0000000074350000-0x0000000074901000-memory.dmp

      Filesize

      5.7MB

    • memory/2656-29-0x0000000002E00000-0x0000000002E10000-memory.dmp

      Filesize

      64KB

    • memory/2656-31-0x0000000074350000-0x0000000074901000-memory.dmp

      Filesize

      5.7MB