Analysis

  • max time kernel
    141s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/03/2024, 07:07

General

  • Target

    c027b9793f81fbf17a3b4507f7868d38.exe

  • Size

    601KB

  • MD5

    c027b9793f81fbf17a3b4507f7868d38

  • SHA1

    bad579070ccc4b1ddfbe3377060704d49e82edaa

  • SHA256

    a5ef4d55c96aca6699873bba5d26645f4e3270ab2122ef8929a443cfb34a5a45

  • SHA512

    8c9b8f38d66c6c80be93161b596e320f44c3838a9b3f1764d5e39b61cd3b2572237996766a92b875644e552da33b5ea6e956abce4ac125a8f62d1f1895dd2afd

  • SSDEEP

    6144:QA/TB+zbqp9lSxjEuWMTom9A/TB+zO3Cpn1bsAS0wvYlESM3kBukYYezRtuSJ13w:fUHnWMoUySA7Rv0gohYYeltuE3st

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c027b9793f81fbf17a3b4507f7868d38.exe
    "C:\Users\Admin\AppData\Local\Temp\c027b9793f81fbf17a3b4507f7868d38.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:3396
    • C:\Users\Admin\AppData\Local\Temp\biemn0bveNa1XvaxsUo9.exe
      "C:\Users\Admin\AppData\Local\Temp\biemn0bveNa1XvaxsUo9.exe"
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      PID:1076
    • C:\Users\Admin\AppData\Local\Temp\vHvj3WAsY1mcPFeThCaG.exe
      "C:\Users\Admin\AppData\Local\Temp\vHvj3WAsY1mcPFeThCaG.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2996
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:8
    1⤵
      PID:3708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\biemn0bveNa1XvaxsUo9.exe

      Filesize

      14KB

      MD5

      b4c3111a9cc347bea4b1df5b81d4af80

      SHA1

      71238d3876926fa3344479c16d21d414d8823738

      SHA256

      deb425cee197f3632514061b77d824b4ed818e0b1da013f4ddf72e4cbe3b648e

      SHA512

      a804fa2fdefb0dce77dda4c94f319de94f408219f8d176cc14e2a75de979f19d35e3c041528d92a16a195554376956c760987cf6824ed7177169ce9914ddaa20

    • C:\Users\Admin\AppData\Local\Temp\vHvj3WAsY1mcPFeThCaG.exe

      Filesize

      312KB

      MD5

      f10bc6dd9b82bf380fedb0c121f1465e

      SHA1

      c09b22968a94ee6efca01373e92bbdde949902cf

      SHA256

      9d9a7dc08d063455e344502cdb2e67b8f9ef9e40e769da14706db4937c8bdf13

      SHA512

      ea12b73d61c46d0c33af4c0e38acfb59a219dff2eddd5ebe5dc19c06f666108559005360de058b2b0208b149e970e265ad827683544094f77279f75153358e1c

    • memory/3396-0-0x00007FF82D350000-0x00007FF82DCF1000-memory.dmp

      Filesize

      9.6MB

    • memory/3396-1-0x00007FF82D350000-0x00007FF82DCF1000-memory.dmp

      Filesize

      9.6MB

    • memory/3396-2-0x0000000000F90000-0x0000000000FA0000-memory.dmp

      Filesize

      64KB

    • memory/3396-3-0x000000001B8F0000-0x000000001B996000-memory.dmp

      Filesize

      664KB

    • memory/3396-4-0x000000001BE70000-0x000000001C33E000-memory.dmp

      Filesize

      4.8MB

    • memory/3396-5-0x000000001C3E0000-0x000000001C47C000-memory.dmp

      Filesize

      624KB

    • memory/3396-6-0x0000000001160000-0x0000000001168000-memory.dmp

      Filesize

      32KB

    • memory/3396-7-0x000000001C560000-0x000000001C5AC000-memory.dmp

      Filesize

      304KB

    • memory/3396-8-0x0000000000F90000-0x0000000000FA0000-memory.dmp

      Filesize

      64KB

    • memory/3396-27-0x00007FF82D350000-0x00007FF82DCF1000-memory.dmp

      Filesize

      9.6MB