Analysis

  • max time kernel
    33s
  • max time network
    35s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/03/2024, 17:37

Errors

Reason
Machine shutdown

General

  • Target

    1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe

  • Size

    543KB

  • MD5

    f8710476bef2421010a186346e1c7172

  • SHA1

    beebcb59aa847196eea2784517038dc41e537b30

  • SHA256

    1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1

  • SHA512

    2bfa061f8a472dfdf9c30a2d1ba2e5b2641c8be7a8d7615a7564f6ff178a743272116187c6bff5ae54dc2e496eadb4148446d8ec0425f39e1ebc779c302dfdd8

  • SSDEEP

    3072:TGC43DksD+XZVputL00000000000000000000000000000000000000000000009:TGC43NaVyrrrrrrrrrrX

Score
10/10

Malware Config

Signatures

  • Modifies visibility of file extensions in Explorer 2 TTPs 5 IoCs
  • Disables RegEdit via registry modification 4 IoCs
  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Drops file in System32 directory 9 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 13 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe
    "C:\Users\Admin\AppData\Local\Temp\1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1.exe"
    1⤵
    • Modifies visibility of file extensions in Explorer
    • Checks computer location settings
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3408
    • C:\Windows\SysWOW64\reg.exe
      "C:\Windows\System32\reg.exe" import C:\Windows\regedit.reg
      2⤵
        PID:3080
      • C:\Windows\SysWOW64\reg.exe
        "C:\Windows\System32\reg.exe" export HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\srservice C:\Windows\regedit.reg
        2⤵
          PID:1132
        • C:\Users\Public\Pictures\svchost.eXe
          "C:\Users\Public\Pictures\svchost.eXe"
          2⤵
          • Modifies visibility of file extensions in Explorer
          • Disables RegEdit via registry modification
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Windows directory
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4856
          • C:\Windows\SysWOW64\reg.exe
            "C:\Windows\System32\reg.exe" import C:\Windows\regedit.reg
            3⤵
              PID:1004
            • C:\Windows\SysWOW64\reg.exe
              "C:\Windows\System32\reg.exe" export HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\srservice C:\Windows\regedit.reg
              3⤵
                PID:2800
            • C:\Users\Public\Music\svchost.eXe
              "C:\Users\Public\Music\svchost.eXe"
              2⤵
              • Modifies visibility of file extensions in Explorer
              • Disables RegEdit via registry modification
              • Checks computer location settings
              • Executes dropped EXE
              • Drops file in System32 directory
              • Drops file in Windows directory
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1796
              • C:\Windows\SysWOW64\reg.exe
                "C:\Windows\System32\reg.exe" import C:\Windows\regedit.reg
                3⤵
                  PID:4160
                • C:\Windows\SysWOW64\reg.exe
                  "C:\Windows\System32\reg.exe" export HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\srservice C:\Windows\regedit.reg
                  3⤵
                    PID:2268
                • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\msmsgs.eXe
                  "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Startup\msmsgs.eXe"
                  2⤵
                  • Modifies visibility of file extensions in Explorer
                  • Disables RegEdit via registry modification
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Drops file in System32 directory
                  • Drops file in Windows directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:4400
                  • C:\Windows\SysWOW64\reg.exe
                    "C:\Windows\System32\reg.exe" import C:\Windows\regedit.reg
                    3⤵
                      PID:2304
                    • C:\Windows\SysWOW64\reg.exe
                      "C:\Windows\System32\reg.exe" export HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\srservice C:\Windows\regedit.reg
                      3⤵
                        PID:4576
                      • C:\Windows\SysWOW64\reg.exe
                        "C:\Windows\System32\reg.exe" import C:\Windows\regedit.reg
                        3⤵
                          PID:3988
                      • C:\Windows\SysWOW64\angle.eXe
                        "C:\Windows\system32\angle.eXe"
                        2⤵
                        • Modifies visibility of file extensions in Explorer
                        • Disables RegEdit via registry modification
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Drops file in System32 directory
                        • Drops file in Windows directory
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:4336
                        • C:\Windows\SysWOW64\reg.exe
                          "C:\Windows\System32\reg.exe" import C:\Windows\regedit.reg
                          3⤵
                            PID:3312
                          • C:\Windows\SysWOW64\reg.exe
                            "C:\Windows\System32\reg.exe" export HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\srservice C:\Windows\regedit.reg
                            3⤵
                              PID:532
                        • C:\Windows\system32\LogonUI.exe
                          "LogonUI.exe" /flags:0x4 /state0:0xa394d855 /state1:0x41c64e6d
                          1⤵
                          • Modifies data under HKEY_USERS
                          • Suspicious use of SetWindowsHookEx
                          PID:5080

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Surat Buat Presiden.htm

                          Filesize

                          656B

                          MD5

                          e0722dddd4442be2d33a6948b7c8d04d

                          SHA1

                          1bc56ec2ca2d1ae3c0cbb2f66289945a32bb3d13

                          SHA256

                          ea7c34f49417b382ff9c872fccd1f5f58636f3001a2fe837ed195a4d239f66e6

                          SHA512

                          2236ab5c1547e58aee6da04f4fe5f44a1292cd026596b3766eb76d468e6b67a391982baaa5f4698ec1c719c0c89142e136b1c0f17aa1ea19e7c4963655823bec

                        • C:\Users\Public\Music\RCX6795.tmp

                          Filesize

                          546KB

                          MD5

                          6c985be10f5b3e7dfaa6b5d778bc8a83

                          SHA1

                          f6f36fb7f0f0116477f8658399f63caa83543812

                          SHA256

                          b6d6a3b60105105cb7b2d34dad85a640a58a8bdd00100aa35994f5796200cd62

                          SHA512

                          ee13a32e1ee4f17a7e0c72eaa2a9864879c3387155f334a408fb7fae4e3482f6baaab09789713ebb30cb28a6f021292aec154c52889a227ab04a260defca9bf9

                        • C:\Users\Public\Pictures\svchost.eXe

                          Filesize

                          543KB

                          MD5

                          f8710476bef2421010a186346e1c7172

                          SHA1

                          beebcb59aa847196eea2784517038dc41e537b30

                          SHA256

                          1062eae8381a9a5cf7f099e7b13a2f5bda15fbd7de11f302e828e949ed4685e1

                          SHA512

                          2bfa061f8a472dfdf9c30a2d1ba2e5b2641c8be7a8d7615a7564f6ff178a743272116187c6bff5ae54dc2e496eadb4148446d8ec0425f39e1ebc779c302dfdd8

                        • C:\Windows\RCX326C.tmp

                          Filesize

                          541KB

                          MD5

                          c974de20451a0cd4dce0b428c4e979e4

                          SHA1

                          fc8023da628a7716bd12723067b5080c212a9cd7

                          SHA256

                          9e5e8afacfb37f9693158ee983e4257e8465dde3ab813acd4ccb9135fc988ab7

                          SHA512

                          689d9578d5deac86fcc3d56cedf591b481bb6d68866f7ab3f01ea01432a5b8e0fba17f300fcb705e080377cfabc6222a7d1556fdb093fa6c6af01dc08e8c7de6