Analysis

  • max time kernel
    139s
  • max time network
    146s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2024 17:36

General

  • Target

    048a302a8a04322488b343fbec8927c3ea75906e1bd6b77c480c0b70bc2a557a.exe

  • Size

    500KB

  • MD5

    9afcb1b8e59edafd0a765a776ef320b1

  • SHA1

    30e0e1068df29911bf5fefc63873c009ded51278

  • SHA256

    048a302a8a04322488b343fbec8927c3ea75906e1bd6b77c480c0b70bc2a557a

  • SHA512

    735b39b427e924aee5344a5a390a3c7e37bd3c1248f5aaeb0f5973ad28f1f434cc0ad32f8308b982473efbf46c209bc265d82d66a060f2482c47fe8459d09187

  • SSDEEP

    6144:A5D4W9xOtO8XMLOjycd+0zmG4lPoFo6P3+zAoIM0eoYuP9BfnGqQpJMJCDxuRddk:A5Dp3x8XPjyYaIhf/0WCDxui/7

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\048a302a8a04322488b343fbec8927c3ea75906e1bd6b77c480c0b70bc2a557a.exe
    "C:\Users\Admin\AppData\Local\Temp\048a302a8a04322488b343fbec8927c3ea75906e1bd6b77c480c0b70bc2a557a.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks computer location settings
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5060
    • C:\Users\Admin\AppData\Local\Temp\n746\s746.exe
      "C:\Users\Admin\AppData\Local\Temp\n746\s746.exe" ins.exe /h a46af.api.socdn.com /t 53a02a45561ca3e2278b47a0 /e 12909069 /u e79b5525-92fa-11e3-8a58-80c16e6f498c /v "C:\Users\Admin\AppData\Local\Temp\048a302a8a04322488b343fbec8927c3ea75906e1bd6b77c480c0b70bc2a557a.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1804
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5060 -s 4344
      2⤵
      • Program crash
      PID:5108
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 5060 -ip 5060
    1⤵
      PID:968
    • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
      "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4160 --field-trial-handle=3084,i,4016110471176367543,14287608422419064331,262144 --variations-seed-version /prefetch:8
      1⤵
        PID:1520

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\n746\s746.exe

        Filesize

        286KB

        MD5

        3e3ab97a3be5f358ef2410034ca1d11e

        SHA1

        132b2d344871a59eea8cd45dcb289f880754de0a

        SHA256

        9343341db998236ead9f7bc0847747fb92cc90cc4709e7b6ff4c2ff6809dd1bb

        SHA512

        31cae25593341fe970dce4532449af639fb4b05a91591c1a22a8be52e2d9937439ef2a73e87cc49e636d24d3c5986a5d1954e9736046da4adbb7ac9857d9e48d

      • memory/1804-11-0x00007FF892D00000-0x00007FF8936A1000-memory.dmp

        Filesize

        9.6MB

      • memory/1804-12-0x00007FF892D00000-0x00007FF8936A1000-memory.dmp

        Filesize

        9.6MB

      • memory/1804-13-0x0000000000E20000-0x0000000000E30000-memory.dmp

        Filesize

        64KB

      • memory/1804-26-0x000000001B4F0000-0x000000001B4FA000-memory.dmp

        Filesize

        40KB

      • memory/1804-29-0x000000001C330000-0x000000001C7FE000-memory.dmp

        Filesize

        4.8MB

      • memory/1804-30-0x000000001C800000-0x000000001C89C000-memory.dmp

        Filesize

        624KB

      • memory/1804-31-0x000000001B500000-0x000000001B508000-memory.dmp

        Filesize

        32KB

      • memory/1804-32-0x0000000000E20000-0x0000000000E30000-memory.dmp

        Filesize

        64KB

      • memory/1804-33-0x0000000000E20000-0x0000000000E30000-memory.dmp

        Filesize

        64KB

      • memory/1804-34-0x0000000000E20000-0x0000000000E30000-memory.dmp

        Filesize

        64KB

      • memory/1804-35-0x000000001C9E0000-0x000000001D137000-memory.dmp

        Filesize

        7.3MB

      • memory/1804-36-0x0000000020390000-0x00000000203F2000-memory.dmp

        Filesize

        392KB

      • memory/1804-37-0x00007FF892D00000-0x00007FF8936A1000-memory.dmp

        Filesize

        9.6MB

      • memory/1804-38-0x0000000020A60000-0x0000000020B9C000-memory.dmp

        Filesize

        1.2MB

      • memory/1804-39-0x00000000210B0000-0x00000000215BE000-memory.dmp

        Filesize

        5.1MB

      • memory/1804-41-0x00007FF892D00000-0x00007FF8936A1000-memory.dmp

        Filesize

        9.6MB

      • memory/1804-42-0x0000000000E20000-0x0000000000E30000-memory.dmp

        Filesize

        64KB

      • memory/1804-43-0x00000000215C0000-0x00000000216C0000-memory.dmp

        Filesize

        1024KB

      • memory/1804-44-0x0000000000E20000-0x0000000000E30000-memory.dmp

        Filesize

        64KB

      • memory/1804-45-0x0000000000E20000-0x0000000000E30000-memory.dmp

        Filesize

        64KB

      • memory/1804-47-0x000000001C9E0000-0x000000001D137000-memory.dmp

        Filesize

        7.3MB

      • memory/1804-48-0x00007FF892D00000-0x00007FF8936A1000-memory.dmp

        Filesize

        9.6MB