Analysis

  • max time kernel
    148s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-03-2024 04:42

General

  • Target

    cd2281116d8ca61ab7cb1e301b5b580e.exe

  • Size

    16KB

  • MD5

    cd2281116d8ca61ab7cb1e301b5b580e

  • SHA1

    1dbe84cbb499dac29d619b7e4b283515cb0900a6

  • SHA256

    9a5139eeb50a93ae805809b587df06f59aed80002fa74a17ff427320fbd2f2e3

  • SHA512

    e87d79648cd92e9adbc3bbd14ddf51c1b3cac9b82567477ff787ebdd3c60a7bd8a95d425cd6c1c400bf2af74f26670bd099543bfcc8f4fa07fa5aba759e3e0d0

  • SSDEEP

    192:f8B1Mhzv1Z8F274/JQtCBdH0dHRdHwdHPH1SdHK18G+j5P:fQ1Yv1Z8jxQtCBqrmuw+B

Score
8/10

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 4 IoCs
  • Sets file execution options in registry 2 TTPs 8 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd2281116d8ca61ab7cb1e301b5b580e.exe
    "C:\Users\Admin\AppData\Local\Temp\cd2281116d8ca61ab7cb1e301b5b580e.exe"
    1⤵
    • Adds policy Run key to start application
    • Sets file execution options in registry
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:1016
    • C:\Windows\LSPRN.EXE
      "C:\Windows\LSPRN.EXE"
      2⤵
      • Adds policy Run key to start application
      • Sets file execution options in registry
      • Executes dropped EXE
      • Adds Run key to start application
      • Modifies Internet Explorer settings
      PID:2324

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\LSPRN.EXE

    Filesize

    16KB

    MD5

    cd2281116d8ca61ab7cb1e301b5b580e

    SHA1

    1dbe84cbb499dac29d619b7e4b283515cb0900a6

    SHA256

    9a5139eeb50a93ae805809b587df06f59aed80002fa74a17ff427320fbd2f2e3

    SHA512

    e87d79648cd92e9adbc3bbd14ddf51c1b3cac9b82567477ff787ebdd3c60a7bd8a95d425cd6c1c400bf2af74f26670bd099543bfcc8f4fa07fa5aba759e3e0d0