Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    07/03/2024, 12:45

General

  • Target

    b8c1fa7b9f8818580e6531103672dade.exe

  • Size

    152KB

  • MD5

    b8c1fa7b9f8818580e6531103672dade

  • SHA1

    83e19142d500dca959dfd159c33ee857df953fe5

  • SHA256

    d59673c999f3f442f8e3408400e963f96c0ff441b9478e90a86026de41a9e487

  • SHA512

    b3b05f1cdc44c84416a122bbde77c1de5b4e3d41a71d3883c10fcf851edd3a33c755ec9f648930ee953192f1581f4c55f3e1127ccdd404596f0529b8316e7369

  • SSDEEP

    3072:UpNlV8gSvbLlf+U704ChxTQqh7/28guGE0ocENjMdr:UpNlVIlGd4CFh7/28gUQ

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • Views/modifies file attributes 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b8c1fa7b9f8818580e6531103672dade.exe
    "C:\Users\Admin\AppData\Local\Temp\b8c1fa7b9f8818580e6531103672dade.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks computer location settings
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3564
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\del.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Windows\SysWOW64\attrib.exe
        attrib -a -r -s -h " C:\Users\Admin\AppData\Local\Temp\b8c1fa7b9f8818580e6531103672dade.exe"
        3⤵
        • Views/modifies file attributes
        PID:3032
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1344 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:1624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\del.bat

      Filesize

      289B

      MD5

      34f9df4592140de286f3d5a50ce349a8

      SHA1

      79be6a924c55608bbaee413b89a30a01be1debd5

      SHA256

      4a616ee615eabfb9d2ff931fb94c921b4bbd07a52316ea13500f5a6aeb60725d

      SHA512

      710898c052418788ead94cf55ef4e1fed41ebc4c4ba2fce5a1d2167db9d431d9cc612e9667921c61ab1fd3f47b8296e9857f05677444c02e7845b25820698e57