Analysis

  • max time kernel
    141s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 02:58

General

  • Target

    e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe

  • Size

    1.2MB

  • MD5

    f2ee7bf59b3d4b3b97de028e9019fdb6

  • SHA1

    123d905cbd55fa087ec83e0d29c5d222739c7cff

  • SHA256

    e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f

  • SHA512

    1c223deea000758738ccea760c0689cd30a01908b7138715ffb5fbf6994cbb93149da79610c90ab4fc68893be47961d4cfbdf46d89673f192fd6ec48bbe91438

  • SSDEEP

    24576:jTbBv5rUDWxz4N1/TmgyBKWIwjmL6THBvWFGa6mPcyGJzQmrD4Fr:9BtgTmEpwRdnoGBQ2Dc

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe
    "C:\Users\Admin\AppData\Local\Temp\e02090cd2eb0b654d0013fe4a8db53ee67fe570d25f5d3b520edc382bc84fb4f.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\xiox.vbe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3608
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /release
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3348
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /release
          4⤵
          • Gathers network information
          PID:4500
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c qtkk.msc fqgpn.msc
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3332
        • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qtkk.msc
          qtkk.msc fqgpn.msc
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2652
          • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
            5⤵
            • Executes dropped EXE
            PID:4592
          • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
            "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
            5⤵
            • Executes dropped EXE
            PID:3112
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 3112 -s 80
              6⤵
              • Program crash
              PID:412
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c ipconfig /renew
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3144
        • C:\Windows\SysWOW64\ipconfig.exe
          ipconfig /renew
          4⤵
          • Gathers network information
          PID:5004
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3112 -ip 3112
    1⤵
      PID:2872

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\akvbcbeiaw.mp2

      Filesize

      554B

      MD5

      86c042d5b9888b95ed539904c124c026

      SHA1

      2eee0fda1944ab3cd233d7dd8da31d50a58148b3

      SHA256

      94ae1530f7a9f7621fdc0603dc88739338ccb3844f5c5fb93117b250991035b9

      SHA512

      2e81f65da77d23a39b46901e74b3a9bd1d02a064ca1f5c8c60391088d5bcb681abc1b823040f5de697f4d40fc6e4a01f3c96e6b0c1a4d54e1073975738932b07

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\bicpgapeng.docx

      Filesize

      652B

      MD5

      155e9e6c9c9cfca2df8d469349c7e43f

      SHA1

      c9f117630ffe172b051a8fb4dd9ad9af295ad34e

      SHA256

      1ed9fbf531664f07dc73d664d77dcc34a61e21eb032d4385c83bd4d1a411a227

      SHA512

      075d2ab2ec549ff8935e9401e6501aa611dacdc1b4d6baa3844c0f7945108feeb47d00c9f25075b81c9648771c4a146e772c03ea462d1cc8e27e6ae2fb348cdb

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\cgacqsirt.icm

      Filesize

      609B

      MD5

      a4e45c9d53798abecdbf78924f846fcc

      SHA1

      747b2709eec81499a427a8bed5607d6ac449e606

      SHA256

      13ab239b9274f3da0b80121a4298696c1ed26dd3bdf784043d781ed43e0fede2

      SHA512

      93ef0b425f8f90e67fdf3e93510f5f27cea8db20e54eabb0f027a20aa59c1442568ae99c2e846405c0988a564955dbf650c632ea3a54dc312e388396bd318e19

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dcjqkn.bin

      Filesize

      551B

      MD5

      004c88acbb1c7b4f6cae4396bf690047

      SHA1

      c69badee5d78ebd7ce3b46f6530c7a3be49cf0a4

      SHA256

      89dd0ca941f5f7589df36a25faa7a8086c8cf08a6fb68bf139bc5341328b7071

      SHA512

      1f96a46e3abbb149b571ac147e7d04cf0649566a96f2a4f1f48fac18ac92c6ae7eb89e8d7d2937cf901b939959ea9ba00507877fcb80643f4d2b9c43408dc64a

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\dswitmeka.msc

      Filesize

      519B

      MD5

      4732adfcfeb08efa3796f0e0a6beb651

      SHA1

      003e3e7deccda3a1cbcd3e826d46a0a879fa74d2

      SHA256

      e32013e2c075779d8efbfff3de13d529f1e4de3439c77933d7514c8a6077a3d5

      SHA512

      08e05297468844702d008932cb1ac096d32aa9c2a310629dab91b725759a802bed57789ed4d4d9756343c35a05296d925aea1fff3fa2f1638fa903be510b6e5b

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\fqgpn.msc

      Filesize

      3.4MB

      MD5

      046bb1378b54366e52f7cf528c1587fa

      SHA1

      5afa355a75bc9c74f09dd6bcdbe0951e29e3a111

      SHA256

      b3734be9b007ad5b73d81ea4a1e96cb56a50bad55331e56201bd455bac595269

      SHA512

      012d7acc2a2bb76cca9550220b004e284baca76959b515c8b2b9b74c32198f80f2a4ea2b6dcfcf8da661b981510fa7e92413088194c4510302b46973bb93669d

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\gdbwchejw.erx

      Filesize

      100KB

      MD5

      28f77c4cf999293bc05dd147b68d26f9

      SHA1

      f631f278b6d094f3134ac847c4ececb6ef1bc2a9

      SHA256

      19d6088b4dc015ebad2e90ee194770a965cbc5718925efbf07540585595f0b8a

      SHA512

      11f71cbb4c322ee39129f413fe18321cfa722f105b254787727a946babafda761770448fe01857a440baac60f7f10a2131818bee082ae1b68f8c42de706e2cac

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\hirpdb.mp2

      Filesize

      510B

      MD5

      667648a92aa7efb24d20ae28913c7180

      SHA1

      52e0f9b641b6a156fde55afc821e9cb60ba97feb

      SHA256

      ce25f276017281d828da734a213402eb7fba49cf8e88ce6e3c608d7bd972410a

      SHA512

      8b2c14b12803126e4be056315624bb298d4fcfd62182243713ab586e64f19ec4a6b46b1548bba24133c6041d922a573757e02e68bccf8350fe9d57a7ef80b3f5

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\jhpnd.jpg

      Filesize

      531B

      MD5

      00292b28f6b528601fc3abbc5c9d1b68

      SHA1

      26fbf9ca8eba6ac0fff1fea60e2ab47d780c5067

      SHA256

      66e57effac847b52ce48c1992ed03e4a01283e6ce51fa608ce584755a048e2c9

      SHA512

      7fb2b3e08929a3cb5aaeb7ba8b90fdd05c0266c7e85456d6c6dededaacadbe1fe8493af576cb7855c42f28a00fab2c6c2ec2377509a32bcd9b392c81b6215801

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\jjrdkfnsng.dll

      Filesize

      676B

      MD5

      774d846b359f0ab76231a99b90faf0f4

      SHA1

      a96d0e11c4c3b938c6285d8cd2db543706bb0539

      SHA256

      c2f0cdd6b87f4a122b662233300170e4336e2f2800cc6adb0db24099d74a8901

      SHA512

      abacef367cb39f56beb809573b8ca928bf4c9d2e711d7a42a0aaf80d75725320fb3809c10870ff5b993cd2b40730f15089dcbdba6121eb389eeda0d768c93ef6

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\keoilvkath.pdf

      Filesize

      507B

      MD5

      93788607c5622f4c425b9b480475a663

      SHA1

      1ae29c007bcc85c8744e1236f4d532006943e6e5

      SHA256

      7b0ab8e990afc2a1b0378102d584ad82973b1bcc301aaac218abb5b5762dd9a9

      SHA512

      fbbdd9bc3c74d1bef0c40c98f5b0eadd2e8ff98bd6f84a35bf20e7ea9cb5ba69b48b7f360b9f27f2d7ea9a2f6dc4a80769cdc5a49f7d71d5898f2d169d243f7b

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\kptrjptj.icm

      Filesize

      602B

      MD5

      19bc8ae4258ccf4fd6b17e0f91650508

      SHA1

      cf7ffbcc198ec0421d46f4690ba6ca06b3e1e8f1

      SHA256

      896678afa147540658e5fbd1b344d122f5897e5ff23a9df18317658f1772110d

      SHA512

      73e06661ed14932083d93f3be85a78a3ca862d35aff0a82283344bd18244b6f26f63bed1b8ec0632ab95d03411c1b717ee7940291c15395cf452c7a744152485

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\kvqjbnjrr.xl

      Filesize

      550B

      MD5

      189288c470a0646f22ff0b387d95a46c

      SHA1

      92b139c73eea73c907ee2efe1f223cdc87cdb93e

      SHA256

      9c6172bd136c76e6ba72e219ba0f18147435fe854e9d5831ae3118c5c0015851

      SHA512

      147dc6e7808b291b9536b40086bb1ebb1d470d842ebd5908dfd1d4fd547325dbb81447feeb53bd4d59cdd01a6e110c287f413dfb721ba7fb4530cb68bf5fd4e7

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\lextvxg.mp2

      Filesize

      593B

      MD5

      dbfc374f445e6281244b407fcf12e81c

      SHA1

      b77402e1e01145f919124450b3f64fbe161b524f

      SHA256

      cb7894828e7e8bdb62f1486b6e92bea3547f7ba01160908d478689ebd32ebda2

      SHA512

      08afec0d49e213e7c1afd50709e7c7b0f1ce0c67d13524ad3c8bf1b35b8866ea400ee762c0540b629504b99e737763c0fb95aa890486b3e61fe61aedf09510fe

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\ncranbcxgh.pdf

      Filesize

      536B

      MD5

      f6198d81d2d907cfb14dde22b0b3f226

      SHA1

      bf609be3e39da42fd294a24ef5fb6cb39933e030

      SHA256

      0ce88ba8afbf060d793c95315557eb3027cade6dd4ef368511a71f2136aa2ff5

      SHA512

      8b031fbdd9692726bbbfb81c8d1e9ea21b6c106ea917f21806fa7232a3cd39ca76915e884e45ceb58d14c0a227c2b82bbe572570da0a501de3b4eaaf233886ae

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qtkk.msc

      Filesize

      925KB

      MD5

      eeaa0f5d82e56659c80fa84d588bf870

      SHA1

      a1aea1de9c42e1ef8c186ef6246dd318040e66de

      SHA256

      3fce07bd7e220e97a1b141da155444f95aba7b5e4325f6a5edb262c025c1e5a9

      SHA512

      20b4d8d117419a511cde61ec37c488fcf86d8d6e9174da2496cd71843e8c7f0dd5b7707e59e8404018f0c7074fef610a48f68e274fa250e05ae89e474ceb8247

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qtkk.msc

      Filesize

      236KB

      MD5

      edf00179aa2e9159b343e2fc65f3b7ea

      SHA1

      8acd6719c9487031368dee5b6cf297cd9e65098f

      SHA256

      4486b548806394233cc109069b9e100ee0fb59f09b3b228f6d100242e555569c

      SHA512

      a5b0b5d522bbcf30a445f1cf913a6888b57ac8201b47cfc248c8d0561e8c343e728ba8dcfe82dab917de818a3fc6adffb39e48ebc6ddfc7bd1b2252b4cbe4567

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\qvie.exe

      Filesize

      540B

      MD5

      41f179c9089dda4b795f0927b469fc55

      SHA1

      52f73561d15ac460f916194d481c56baf77ba7e7

      SHA256

      128659866a56fea6ac28efab3060ca3b57ebd9040d17efb77d1ffead15768e9c

      SHA512

      8531c176b0ddb9594387d4bd3309a098c283304a7620a6f4611e964e784c0a88a1366c3fc20046e58c7c583e68b259f1a5fdc59ae547b0e64b04905af2746616

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\svrker.bmp

      Filesize

      32KB

      MD5

      4e5dc6cf1d8fef6577a7d919102e0d04

      SHA1

      d3dc1afcedba20ecd45f9c061a63bd721ee6fb66

      SHA256

      849dca0780c70e59a8ee3fa65e5fd82fe7c4af17e26fa17d3726cfefea0913ef

      SHA512

      3c861ee898cdb0d75457ab759a56d36b531a1c9dec517ccd4cb29b6e48cd030d97de23461b39b8c704a90490ea51f277e6b19ff30d12c797b7d909b4073e1430

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\svrker.bmp

      Filesize

      32KB

      MD5

      899da02f2f451eb750e19c7573777da8

      SHA1

      841bca52252bdc878384111540a7720873852817

      SHA256

      99b7c8b93c190cea265eba8cd89e8fbd2bf1978a594b2be4e01541448c7e0dfe

      SHA512

      9f977a73efeaace72e6d803e65ae7167f53ca2c00aed782c107d1e6db61853afa24cdaa7300b2671c5e0b5a1051d7513eff9f0b48c51032100e25b5cfd3a4d2f

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\txnlvhif.xl

      Filesize

      633B

      MD5

      9fc96e13d5734ad8a61e48866e066298

      SHA1

      170173a972c2c2c5208f50a5c1e1bd936c1e0a66

      SHA256

      b0de14752bd5816010c2d226f84ab348e8098fcbd3078420dc91b5687b764631

      SHA512

      a9c90fc3f9c5c5bcd916d2294559e62487e366e1cd491c183d85c94f3ec1cab101604796d58571bd76692b2c02ad4c45729e639217907a6ec4c4fc91a25ac78c

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\vasgdwjjb.mp2

      Filesize

      616B

      MD5

      09ecfa1b22bcd9b1c5b4d259ba5564d9

      SHA1

      788cc65540b8ef6733fe68a7baa64e8d8f968994

      SHA256

      b6b4ac62c8ba6349cfc8a92998c91b8aca6058fe82b53cc110e854123cd422dd

      SHA512

      30a034d639393861403b2fe451ae0f355a231a1ff5dfcfbee3b009acba5e3a3c133159b1c10ecd5e59e69ae8c65ab833be1312c3af70201fdc939d3a1d6310a1

    • C:\Users\Admin\AppData\Local\Temp\RarSFX0\xiox.vbe

      Filesize

      77KB

      MD5

      950060ab1ef594511bd273fab2c569d5

      SHA1

      1c7f883da063e4f8220389ef09a08ef97517cd28

      SHA256

      c11621cf6ecc82b31277acfbb7f0f2634e09539003a889dbc3ec086dc7ee83bc

      SHA512

      55eb8f174bcedf9824026c82776d0801c8bc4a24d0f49bf9e67f70a3d8eb9281d987b51ecdbd8058a72ccce255fa084cd27459591e3ce3605d46cf4495759b6b

    • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe

      Filesize

      44KB

      MD5

      9d352bc46709f0cb5ec974633a0c3c94

      SHA1

      1969771b2f022f9a86d77ac4d4d239becdf08d07

      SHA256

      2c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390

      SHA512

      13c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b

    • C:\Users\Admin\AppData\Roaming\cmfi\qtkk.msc

      Filesize

      31KB

      MD5

      9bcd3baa5b71bfdffe66578a23665363

      SHA1

      66d048778944d28ad8adcb7eff5a3875844a0118

      SHA256

      134e4224c8ef6d796a0877e3a8085a7f51f47e7c936d7d8bafd94bda00d99154

      SHA512

      325c6299b60ba7380db2de290b8ebf15e07027b4344acb75ce6c1bebf51038225fb20953e42b65eb3e71dcdeb893c4ef5393a5f654caf3eeaf250ca3803f5f75

    • C:\Users\Admin\AppData\Roaming\cmfi\xiox.vbe

      Filesize

      46KB

      MD5

      9f5e20ba5f52e0a91be62196183a8c95

      SHA1

      84d629f3ef6892a76170cc7250efaaee4995acc7

      SHA256

      8363f18916218adc5838a3a643aa79e2ed3c9f3d095725d39e95c8e1f442a542

      SHA512

      e38cb801cf5dc2309e4785462f0e2618d1fe08d7c436d172296c8af40a6527dff52bbdb4eb9a8eb1c7d260b5a986410da5bbc04b5968f4ec0b78553c83646a6b