Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-03-2024 15:43

General

  • Target

    df859feda2e7af11ce9b81ecb9090691.exe

  • Size

    61KB

  • MD5

    df859feda2e7af11ce9b81ecb9090691

  • SHA1

    2cca84df83856523c36b8da73e5bac5bd147771d

  • SHA256

    60cba11aef72dd5f445f90673fafe42c748f8cce0770ea6dad0c57611986b61c

  • SHA512

    01abb312363d01ef4d1336fcc0b33dee8fb22e5610be4fd4e0d8e2b4045785ca7ffc545721d1989394cea13716530d08105734a09d1a1bcfce4be5b110ae986d

  • SSDEEP

    1536:pA2yIzeIHTgI0Tv8Q5VnVQ2broOpgpi6FBej:uIzsITQ5VuKrnoFgj

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Windows directory 7 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Runs .reg file with regedit 1 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\df859feda2e7af11ce9b81ecb9090691.exe
    "C:\Users\Admin\AppData\Local\Temp\df859feda2e7af11ce9b81ecb9090691.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2752
    • C:\Users\Admin\AppData\Local\Temp\df859feda2e7af11ce9b81ecb9090691.exe
      C:\Users\Admin\AppData\Local\Temp\df859feda2e7af11ce9b81ecb9090691.exe
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4912
      • C:\Windows\systems.exe
        "C:\Windows\systems.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3028
        • C:\Windows\systems.exe
          C:\Windows\systems.exe
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4420
          • C:\Windows\SysWOW64\regedit.exe
            "C:\Windows\System32\regedit.exe" /s C:\Windows\noruns.reg
            5⤵
            • Runs .reg file with regedit
            PID:5068
          • C:\Windows\SysWOW64\net.exe
            "C:\Windows\System32\net.exe" stop sharedaccess
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2352
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop sharedaccess
              6⤵
                PID:4472
            • C:\Windows\SysWOW64\net.exe
              "C:\Windows\System32\net.exe" stop KVWSC
              5⤵
              • Suspicious use of WriteProcessMemory
              PID:3624
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop KVWSC
                6⤵
                  PID:3464
              • C:\Windows\SysWOW64\sc.exe
                "C:\Windows\System32\sc.exe" config KVWSC start= disabled
                5⤵
                • Launches sc.exe
                PID:3988
              • C:\Windows\SysWOW64\net.exe
                "C:\Windows\System32\net.exe" stop KVSrvXP
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:4520
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop KVSrvXP
                  6⤵
                    PID:2296
                • C:\Windows\SysWOW64\sc.exe
                  "C:\Windows\System32\sc.exe" config KVSrvXP start= disabled
                  5⤵
                  • Launches sc.exe
                  PID:3100
                • C:\Windows\SysWOW64\net.exe
                  "C:\Windows\System32\net.exe" stop kavsvc
                  5⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3260
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop kavsvc
                    6⤵
                      PID:4684
                  • C:\Windows\SysWOW64\sc.exe
                    "C:\Windows\System32\sc.exe" config kavsvc start= disabled
                    5⤵
                    • Launches sc.exe
                    PID:3800
                  • C:\Windows\SysWOW64\sc.exe
                    "C:\Windows\System32\sc.exe" config RsRavMon start= disabled
                    5⤵
                    • Launches sc.exe
                    PID:3664
                  • C:\Windows\SysWOW64\net.exe
                    "C:\Windows\System32\net.exe" stop RsCCenter
                    5⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3740
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop RsCCenter
                      6⤵
                        PID:3376
                    • C:\Windows\SysWOW64\sc.exe
                      "C:\Windows\System32\sc.exe" config RsCCenter start= disabled
                      5⤵
                      • Launches sc.exe
                      PID:4924
                    • C:\Windows\SysWOW64\net.exe
                      "C:\Windows\System32\net.exe" stop RsRavMon
                      5⤵
                        PID:5048
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop RsRavMon
                          6⤵
                            PID:3192
                • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
                  "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3096 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:8
                  1⤵
                    PID:808

                  Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Windows\noruns.reg

                    Filesize

                    122B

                    MD5

                    704f9f14e6c5b902de15f37bbb234bbc

                    SHA1

                    4e7bd14012b5fe1b07b9ed99a00565ed1d86348b

                    SHA256

                    69c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4

                    SHA512

                    02376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042

                  • C:\Windows\systems.exe

                    Filesize

                    61KB

                    MD5

                    df859feda2e7af11ce9b81ecb9090691

                    SHA1

                    2cca84df83856523c36b8da73e5bac5bd147771d

                    SHA256

                    60cba11aef72dd5f445f90673fafe42c748f8cce0770ea6dad0c57611986b61c

                    SHA512

                    01abb312363d01ef4d1336fcc0b33dee8fb22e5610be4fd4e0d8e2b4045785ca7ffc545721d1989394cea13716530d08105734a09d1a1bcfce4be5b110ae986d

                  • memory/2752-1-0x00000000005A0000-0x00000000005A1000-memory.dmp

                    Filesize

                    4KB

                  • memory/2752-4-0x0000000010000000-0x0000000010033000-memory.dmp

                    Filesize

                    204KB

                  • memory/2752-0-0x0000000010000000-0x0000000010033000-memory.dmp

                    Filesize

                    204KB

                  • memory/3028-32-0x0000000010000000-0x0000000010033000-memory.dmp

                    Filesize

                    204KB

                  • memory/3028-29-0x0000000000510000-0x0000000000511000-memory.dmp

                    Filesize

                    4KB

                  • memory/3028-27-0x0000000010000000-0x0000000010033000-memory.dmp

                    Filesize

                    204KB

                  • memory/4420-35-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4420-42-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4420-46-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4420-45-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4420-43-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4420-28-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4420-41-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4420-37-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4420-36-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4420-33-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4420-34-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4912-6-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4912-8-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4912-5-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4912-22-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4912-12-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4912-9-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4912-2-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4912-7-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4912-15-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB

                  • memory/4912-13-0x0000000000400000-0x0000000000438000-memory.dmp

                    Filesize

                    224KB