Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2024 07:48

General

  • Target

    Mocha.Telnet.v3.2.XScale.Smartphone200x.Incl.Keygen-SyMPDA/sym-wmsmtelnetsp.exe

  • Size

    301KB

  • MD5

    acef837c9278c96f5f00e1b9e8338788

  • SHA1

    906bcec3f2aeb44127d954992e6ad6cd4ef2d87b

  • SHA256

    cae5105db3f5891d559fd1a9392c27138dd2481ccfd568884838d839b13f4bb6

  • SHA512

    d259f6554ecfbd8fe2afacabaf73e9f64a6b0d612757808adecfd355460c56234c55d25209d0dc91987c62f76b0fc1ca3a7897af8f753f14f7e2afc83b9bd99a

  • SSDEEP

    3072:0Rx4HYBvD+KLgB1batiBFVkiW2C3IZN2YtM9aNHa6kJo0zhDAAdt9XZAHlzxC4qf:sJaiaZTY1DAAGxCAjFkfItY0NfjMj

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Mocha.Telnet.v3.2.XScale.Smartphone200x.Incl.Keygen-SyMPDA\sym-wmsmtelnetsp.exe
    "C:\Users\Admin\AppData\Local\Temp\Mocha.Telnet.v3.2.XScale.Smartphone200x.Incl.Keygen-SyMPDA\sym-wmsmtelnetsp.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3684
    • C:\Users\Admin\AppData\Local\Temp\setup_m.exe
      "C:\Users\Admin\AppData\Local\Temp\setup_m.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4020
      • C:\Windows\winlogon.exe
        C:\Windows\winlogon.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetWindowsHookEx
        PID:2948
    • C:\Users\Admin\AppData\Local\Temp\setup.exe
      "C:\Users\Admin\AppData\Local\Temp\setup.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:4708
      • C:\Users\Admin\AppData\Local\Temp\sxe5BFD.tmp
        "C:\Users\Admin\AppData\Local\Temp\sxe5BFD.tmp"
        3⤵
        • Executes dropped EXE
        PID:1832

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\setup.exe

    Filesize

    95KB

    MD5

    ee7b6f54febcf982fb0e3f71b8621c80

    SHA1

    87fb71dda848774e88a6819daf2044c854f4cf80

    SHA256

    dcff271a955a4b04350f4b1e63166fc79497ba5ad561dc82f6d7b881493156d9

    SHA512

    1fac6fb8e511bfe6543c453454ed7bcaf75174bf83742253edab45e2390503c468b868b3647694fc3f5470dc508da42dcffc08c86c4dd5867abece7dcaa19fd2

  • C:\Users\Admin\AppData\Local\Temp\setup_m.exe

    Filesize

    200KB

    MD5

    292a5adf25ddf66b98616243fdd11ed7

    SHA1

    b8de129bbed53d5de11c84a63f4d5b9602846a15

    SHA256

    45ae78216e5c0339848bc101dc18ad41f23e6cb673bdf0f26f4558342343901c

    SHA512

    67983db229d54958362f1d320f08d375911da5d68f1961c55613294f36295f20a2ec523b3d189c88bef198970a79f98fae76b26de37ad26c1190e702f4b97171

  • C:\Users\Admin\AppData\Local\Temp\sxe5BDB.tmp

    Filesize

    15KB

    MD5

    bd815b61f9948f93aface4033fbb4423

    SHA1

    b5391484009b39053fc8b1bba63d444969bafcfa

    SHA256

    b018bf9e9f8b6d945e6a2a25984970634884afabc580af2b4e855730520d5d76

    SHA512

    a363abe97b5a44e5d36af859e8d484daffe1d8e321c87969a75d1bfaa4288a5e6be1922a02c6d72937c84e81a79a1c7f6c9f2a44a995cac3f993ed5608afcd71

  • C:\Users\Admin\AppData\Local\Temp\sxe5BFD.tmp

    Filesize

    220KB

    MD5

    44c2017831e7bcf6ed9b3674d9d9304a

    SHA1

    51b099c5f4571b505b249d4b755715a2b6e265c3

    SHA256

    1bc84c24d61e62f7564a3611cc9e25d81cae0abbc9218040cd82287c5d27fa39

    SHA512

    22a9bebef07b7e4bea1d086f6c53c305be6e2f2ec048f718a17e5923caa009194ca74fa9088a13ba470ce0753ed0ac5d48855e8c85e4c3fef56a79de3be47738

  • memory/2948-38-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/3684-0-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/3684-18-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/4020-10-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/4020-37-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB