Analysis

  • max time kernel
    146s
  • max time network
    164s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-03-2024 05:04

General

  • Target

    b1493c9c3de438c1d925f3a4af556f04.exe

  • Size

    2.2MB

  • MD5

    b1493c9c3de438c1d925f3a4af556f04

  • SHA1

    16ba06f5872a5d79ad1dd835669a9d5f55cf10d2

  • SHA256

    418f4beab3913272a5ce86075202e67fe89a273c7840b53d0eccb0229dfea020

  • SHA512

    9556f48f59abd27cdd919fcb892de800d5291b012ebef9c4042804662f58f671fff8f700f3c22e9c6566f7994fcbd7cbadd35625faa1e17e5f72285b4359fad9

  • SSDEEP

    24576:0KtlfLm3/4s8krM4hsJgqGMDA2Q0CDwuJZqrMNCYjef9juun4MoTq0:Hj44VTgfH2r6qfpo2

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 2 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1493c9c3de438c1d925f3a4af556f04.exe
    "C:\Users\Admin\AppData\Local\Temp\b1493c9c3de438c1d925f3a4af556f04.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3244
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "svchost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5032
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "svchost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"
        3⤵
        • Adds Run key to start application
        PID:2904
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4496
      • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
        "C:\Users\Admin\AppData\Local\Temp\\AddInProcess32.exe"
        3⤵
        • Executes dropped EXE
        PID:4040
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4040 -s 188
          4⤵
          • Program crash
          PID:1532
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 4040 -ip 4040
    1⤵
      PID:4084

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Persistence

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Privilege Escalation

    Boot or Logon Autostart Execution

    1
    T1547

    Registry Run Keys / Startup Folder

    1
    T1547.001

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      Filesize

      42KB

      MD5

      9827ff3cdf4b83f9c86354606736ca9c

      SHA1

      e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723

      SHA256

      c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a

      SHA512

      8261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
      Filesize

      1.4MB

      MD5

      217647354f5d8fef9793b87848a5e5c6

      SHA1

      f6c04b6afb8574833619293651a7c6aeab999644

      SHA256

      44c0477b08b80765788d30738d24caaad26b217ba11880fd92d8ce5e254b88aa

      SHA512

      f140e830447dc96cd10db1652b072bb6fb403bca34322783408a5181716a3c568d96abc067821462ff724c1dc70f4755559c7cf788c86f31f0658e24570d9458

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.exe
      Filesize

      2.2MB

      MD5

      b1493c9c3de438c1d925f3a4af556f04

      SHA1

      16ba06f5872a5d79ad1dd835669a9d5f55cf10d2

      SHA256

      418f4beab3913272a5ce86075202e67fe89a273c7840b53d0eccb0229dfea020

      SHA512

      9556f48f59abd27cdd919fcb892de800d5291b012ebef9c4042804662f58f671fff8f700f3c22e9c6566f7994fcbd7cbadd35625faa1e17e5f72285b4359fad9

    • memory/3244-8-0x0000000075030000-0x00000000757E0000-memory.dmp
      Filesize

      7.7MB

    • memory/3244-3-0x00000000059F0000-0x0000000005A82000-memory.dmp
      Filesize

      584KB

    • memory/3244-5-0x00000000059C0000-0x00000000059D0000-memory.dmp
      Filesize

      64KB

    • memory/3244-6-0x0000000005A90000-0x0000000005ABC000-memory.dmp
      Filesize

      176KB

    • memory/3244-7-0x0000000007420000-0x000000000742A000-memory.dmp
      Filesize

      40KB

    • memory/3244-0-0x0000000000DE0000-0x0000000001024000-memory.dmp
      Filesize

      2.3MB

    • memory/3244-9-0x00000000059C0000-0x00000000059D0000-memory.dmp
      Filesize

      64KB

    • memory/3244-4-0x0000000005B70000-0x0000000005C0C000-memory.dmp
      Filesize

      624KB

    • memory/3244-2-0x0000000006080000-0x0000000006624000-memory.dmp
      Filesize

      5.6MB

    • memory/3244-24-0x0000000075030000-0x00000000757E0000-memory.dmp
      Filesize

      7.7MB

    • memory/3244-1-0x0000000075030000-0x00000000757E0000-memory.dmp
      Filesize

      7.7MB

    • memory/4040-30-0x0000000000900000-0x0000000000CE4000-memory.dmp
      Filesize

      3.9MB

    • memory/4040-31-0x0000000000900000-0x0000000000CE4000-memory.dmp
      Filesize

      3.9MB

    • memory/4496-25-0x0000000075030000-0x00000000757E0000-memory.dmp
      Filesize

      7.7MB

    • memory/4496-26-0x0000000006720000-0x0000000006732000-memory.dmp
      Filesize

      72KB

    • memory/4496-23-0x0000000075030000-0x00000000757E0000-memory.dmp
      Filesize

      7.7MB