Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-03-2024 13:22

General

  • Target

    d39de5973189eb4d0c884dfaa103597a.exe

  • Size

    160KB

  • MD5

    d39de5973189eb4d0c884dfaa103597a

  • SHA1

    625766dd30fb1e2a077ca7c15b0f74de1dc5556c

  • SHA256

    7277fc173a65e84426217ea49d790b19b5b5d8a3f24be2acca4f4e6a1635858e

  • SHA512

    e99b39ad04ef89c68e7692aa9bfc2a90364b6d7f3bb2e3fa35924158256d85cab2971706220f6263fd21c668ade39a7c82043ee33d445826fb1b161067e28a1e

  • SSDEEP

    3072:Zghg8Sn4dnbla5eree+ELWqqdSTvC6HWYppiAKNWlpt7ryfrb0l3icB6Cb:Zwq4Rl+erlRLcd5626pDX3BOzIl3icVb

Score
8/10

Malware Config

Signatures

  • Creates new service(s) 1 TTPs
  • Modifies Windows Firewall 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 8 IoCs
  • Launches sc.exe 2 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d39de5973189eb4d0c884dfaa103597a.exe
    "C:\Users\Admin\AppData\Local\Temp\d39de5973189eb4d0c884dfaa103597a.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in System32 directory
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" create icfgnt532 type= share start= auto DisplayName= "Internet Connection Wizard" group= "Event Log" binPath= "rundll32.exe C:\Windows\system32\icfgnt532.dll,ojur"
      2⤵
      • Launches sc.exe
      PID:456
    • C:\Windows\SysWOW64\sc.exe
      "C:\Windows\System32\sc.exe" description icfgnt532 "Internet Connection Wizard"
      2⤵
      • Launches sc.exe
      PID:2012
    • C:\Windows\SysWOW64\netsh.exe
      C:\Windows\system32\netsh.exe firewall add portopening TCP 1599 messenger
      2⤵
      • Modifies Windows Firewall
      PID:3528
    • C:\Users\Admin\AppData\Local\Temp\d54dec2e.exe
      "C:\Users\Admin\AppData\Local\Temp\d54dec2e.exe"
      2⤵
      • Executes dropped EXE
      PID:4572
  • C:\Windows\system32\AUDIODG.EXE
    C:\Windows\system32\AUDIODG.EXE 0x514 0x49c
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:4568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\d54dec2e.exe

    Filesize

    65KB

    MD5

    ab437ad2ca17aecbccbb582a9b426975

    SHA1

    68a333a6b8746bdc8f13d3e6bae11dfeb782706b

    SHA256

    7d408f3a3197c7dc7a6ca0f6360c6102899019e2ddb222450539807b11437a6e

    SHA512

    2e7feb013ea7a6105b7fa8b2040d47d14e06197aead6cae30a965f311863fdae4e58837579a6b6d4343450d59ea51c619f2cb5ae6cf88f2b5eb0857fc64f2dd9

  • memory/1380-0-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/1380-17-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB