Analysis

  • max time kernel
    254s
  • max time network
    204s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/03/2024, 16:05

General

  • Target

    EXPUNGEDv3.exe

  • Size

    290KB

  • MD5

    d8226317108044054e82c1e68fda8a47

  • SHA1

    509f7238935d1130dae843b07f2d81aa9b57b1bc

  • SHA256

    8a52bc2c0c8e66a9b1f638763200438b9a611a9d990cc6f95b3d089832e8455b

  • SHA512

    4b5a407f84da5c6c621046df0f26d777ea43f220155aef02ebf0f549d3661cd0cbc8057e8c9e5acf1c28d6057d67c89b77df69a545c321e50695475962fd5881

  • SSDEEP

    3072:ClPur1xNfoPCUf8OYZbB4ya2TKGJA4IPKfjK/S8R:ClwNQYNB4QKGHC

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Collects information from the system 1 TTPs 24 IoCs

    Uses WMIC.exe to find detailed system information.

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\EXPUNGEDv3.exe
    "C:\Users\Admin\AppData\Local\Temp\EXPUNGEDv3.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\cmd.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3424
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          • Suspicious use of AdjustPrivilegeToken
          PID:4720
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:2944
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          • Suspicious use of AdjustPrivilegeToken
          PID:2480
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4904
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          PID:3120
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4480
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          PID:4420
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3512
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          PID:3044
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:5024
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          PID:1084
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4332
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          PID:1652
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          PID:180
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4044
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          PID:4800
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:4720
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          PID:4064
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3564
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          PID:4964
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1660
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          PID:4124
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1496
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          PID:4796
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:508
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          PID:3856
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1440
        • C:\Windows\System32\Wbem\WMIC.exe
          wmic logicaldisk get caption
          4⤵
          • Collects information from the system
          PID:660
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
        3⤵
          PID:2876
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic logicaldisk get caption
            4⤵
            • Collects information from the system
            PID:2372
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
          3⤵
            PID:4468
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic logicaldisk get caption
              4⤵
              • Collects information from the system
              PID:3320
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
            3⤵
              PID:4212
              • C:\Windows\System32\Wbem\WMIC.exe
                wmic logicaldisk get caption
                4⤵
                • Collects information from the system
                PID:2264
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
              3⤵
                PID:2640
                • C:\Windows\System32\Wbem\WMIC.exe
                  wmic logicaldisk get caption
                  4⤵
                  • Collects information from the system
                  PID:4776
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
                3⤵
                  PID:444
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic logicaldisk get caption
                    4⤵
                    • Collects information from the system
                    PID:3852
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
                  3⤵
                    PID:4576
                    • C:\Windows\System32\Wbem\WMIC.exe
                      wmic logicaldisk get caption
                      4⤵
                      • Collects information from the system
                      PID:4500
                  • C:\Windows\system32\cmd.exe
                    C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
                    3⤵
                      PID:4724
                      • C:\Windows\System32\Wbem\WMIC.exe
                        wmic logicaldisk get caption
                        4⤵
                        • Collects information from the system
                        PID:4464
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
                      3⤵
                        PID:2992
                        • C:\Windows\System32\Wbem\WMIC.exe
                          wmic logicaldisk get caption
                          4⤵
                          • Collects information from the system
                          PID:4920
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c wmic logicaldisk get caption
                        3⤵
                          PID:4860
                          • C:\Windows\System32\Wbem\WMIC.exe
                            wmic logicaldisk get caption
                            4⤵
                            • Collects information from the system
                            PID:428

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Users\Admin\AppData\Local\Temp\cmd.bat

                      Filesize

                      6KB

                      MD5

                      530533e09f1eeea858a42131da84d4d7

                      SHA1

                      9b6671bb702138d840d5c93d8b52a95f44464d28

                      SHA256

                      7f41133f4fd205cf5173505694869d628c44a0a961f37ad2180c2a40d3e5ddb9

                      SHA512

                      f01b5beaf046d7fde0e9c86f203583d51e2ff19e0670c6b7bc3a729ca07ec5902bed8f46b1064bd785b2db3ffa116dce7304d35eb740eb2bb66a1ec3abe3d7b9

                    • memory/1800-0-0x0000000000670000-0x00000000006BE000-memory.dmp

                      Filesize

                      312KB

                    • memory/1800-4-0x00007FFAF8100000-0x00007FFAF8BC1000-memory.dmp

                      Filesize

                      10.8MB

                    • memory/1800-6-0x00007FFAF8100000-0x00007FFAF8BC1000-memory.dmp

                      Filesize

                      10.8MB