Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2024, 02:46

General

  • Target

    7b3aeb62e157caa715e199777211d048.exe

  • Size

    387KB

  • MD5

    7b3aeb62e157caa715e199777211d048

  • SHA1

    25c4a48ca0096460eb1cdeaf142f0fa60795f16a

  • SHA256

    22ce96622700e71bf75433a0013bc1e1836f4879351c37c2e4482bf9b45659dd

  • SHA512

    f2a8578aead35e33c171b43a2dc5cd1e2d16d207230764f295f0ba5d0290f7e4843e55c3af92c6432460ce0b6b3bcf1b403dca59bae53544f4da07a8d408c731

  • SSDEEP

    12288:BqYXje0DF9k64/QSywqP0T8oIN1AHDFhY25fC2WF9s/204P:BqYDF9k64/Q9j28okAHDHY25fC2WF9sw

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7b3aeb62e157caa715e199777211d048.exe
    "C:\Users\Admin\AppData\Local\Temp\7b3aeb62e157caa715e199777211d048.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1528
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3724
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:3328
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"
          4⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:3468
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\7b3aeb62e157caa715e199777211d048.exe" "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"
      2⤵
        PID:2724
      • C:\Users\Admin\AppData\Local\Temp\StikyNote.exe
        "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:2008
        • C:\Program Files (x86)\Internet Explorer\iexplore.exe
          "C:\Program Files (x86)\Internet Explorer\iexplore.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1708

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\StikyNote.exe

      Filesize

      384KB

      MD5

      0c6907695b548b08e21cf411205541b5

      SHA1

      fe3f8b4b07307d9589d1531b884ba2ec3aa3255d

      SHA256

      0fc0d96dc2c40db4721251f9b86c671abbccc9f7fb2e86d84a531a2e1d2e71bf

      SHA512

      7e77c0e0d371f7283e836dc839cf045b39640a06eff2d5676242ed2721db3587b1356c95fef4d61ca2f7ffa132924c181c0b65c420d13aa1aac352f600299b2f

    • C:\Users\Admin\AppData\Local\Temp\StikyNote.exe

      Filesize

      387KB

      MD5

      7b3aeb62e157caa715e199777211d048

      SHA1

      25c4a48ca0096460eb1cdeaf142f0fa60795f16a

      SHA256

      22ce96622700e71bf75433a0013bc1e1836f4879351c37c2e4482bf9b45659dd

      SHA512

      f2a8578aead35e33c171b43a2dc5cd1e2d16d207230764f295f0ba5d0290f7e4843e55c3af92c6432460ce0b6b3bcf1b403dca59bae53544f4da07a8d408c731

    • C:\Users\Admin\AppData\Local\Temp\StikyNote.tmp

      Filesize

      387KB

      MD5

      b50332c79ddec1e8b9417be936a20c81

      SHA1

      430cef0e1cd303f2491c21c95d80ccfda6041e41

      SHA256

      8c0a3d908c53e2a27147c4494e8807353f0ba17b191dde9cadc0b928d8503d8f

      SHA512

      342fb8104703c3bf806b650a5b000b2953555328c0bcf37a404f7af2b9f9b17f2be5dec273b295629d5613d215e23a2896c2cbf455004f83fb0803ba73c56714

    • C:\Users\Admin\AppData\Local\Temp\setup.tmp

      Filesize

      47B

      MD5

      72a392628d7f368bb9bc9689a694f55a

      SHA1

      feacee9c66028a333446f2c968bcb3d567a4033d

      SHA256

      afa60141aee93d7e3f3d8d296e36de9956f588a6cad99f8e79ce36ab88e828dd

      SHA512

      76f40be7d3e0de960c7bc199fd094c64588841e5b6a1b99bd7fd2e3b53f9e381ded992ee6d67848dd4fda755416792ff6e29bf0acf1a348796dcf7e9bf96229e

    • memory/1708-12-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/2008-13-0x0000000075FA0000-0x0000000076090000-memory.dmp

      Filesize

      960KB

    • memory/2008-14-0x0000000075FA0000-0x0000000076090000-memory.dmp

      Filesize

      960KB

    • memory/3724-2-0x0000000001280000-0x0000000001283000-memory.dmp

      Filesize

      12KB