Analysis

  • max time kernel
    142s
  • max time network
    133s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/03/2024, 20:31

General

  • Target

    e008818c75643d82199e31c9505244d5.exe

  • Size

    6.7MB

  • MD5

    e008818c75643d82199e31c9505244d5

  • SHA1

    aadac5ec4b66f1439b8c58958f7c1e4c4ebe5cf6

  • SHA256

    817d3154bc938d5d3ae63006bca766135a2c3d2bf67d3049c4bf445e9ed4e7a9

  • SHA512

    cd77edf95bba8715a6bb737c0a7c583d72a910c968eb8beaecb7b63ec9f9cb76d5bf872f1515dc7653530015df4a1c63562d186c20dc4d176edd53b7a03736ca

  • SSDEEP

    196608:uG79v1os23eAwCUzHyA24oMTB6kB97fSh5daKfG1:uGd6e2U7B24oI6k/7fWf7G1

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e008818c75643d82199e31c9505244d5.exe
    "C:\Users\Admin\AppData\Local\Temp\e008818c75643d82199e31c9505244d5.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\run.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3256
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V dllhost /D "\"C:\Users\Admin\AppData\Local\dllhost.exe\"" /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1312
        • C:\Windows\SysWOW64\reg.exe
          REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V dllhost /D "\"C:\Users\Admin\AppData\Local\dllhost.exe\"" /f
          4⤵
          • Adds Run key to start application
          • Modifies registry key
          PID:2584
    • C:\Users\Admin\AppData\Local\dllhost.exe
      "C:\Users\Admin\AppData\Local\dllhost.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of SetWindowsHookEx
      PID:3436
    • C:\Program Files\7-Zip\7zFM.exe
      "C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\3.rar"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:1648

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\3.rar

          Filesize

          5.4MB

          MD5

          fb7ba3e57ae6f9624427b5a2b698b625

          SHA1

          3412143d235e597f773b2f5e7f9534eef324d900

          SHA256

          a43bfa5fe758053be69d029755b69e73ec1d56eb3dc5525249c4137235fe05c5

          SHA512

          e57eac32135622959513b4f2ec289ea57d9a662a7d48876e7022f75bc36881353ea32bac5e8f16ff719f8b0553f787abc282871b0c707dae53f0e52305d86748

        • C:\Users\Admin\AppData\Local\Temp\run.bat

          Filesize

          144B

          MD5

          87b7f8ab243669deb60ef571f05e17a4

          SHA1

          b9e20abe8e7bb4ff6b00c20695d88c2b7410d386

          SHA256

          b19841d19d8dffc21449458e64fa279128c289c5e394fdbbb1efc43e7809f794

          SHA512

          6524187cd49b7080813cdd4a1a5301f0393c0a3e2e161a813249e9389ee773dbce38eecf8f0cbf54ccbdfb39915afc2df9c675e176465546beab2b9336b5cf5e

        • C:\Users\Admin\AppData\Local\dllhost.exe

          Filesize

          272KB

          MD5

          7f32d39f68d683b303454aec93df0ff7

          SHA1

          48d4556bbfb2c55e0febc2023c666479097076e2

          SHA256

          1e4664ecd00c201b630b4a056355d28f850922771aad19ee2980490b80ed1836

          SHA512

          e75e59f90dfb4fb556de079b808fa086d1270c643044ea817993db022ebdf72662cb885aaa564890f8cc5af4d04c1a69586d2f0faabcfe7ec366fb8a0600b164

        • C:\Users\Admin\AppData\Local\ntcheck.dll

          Filesize

          532KB

          MD5

          8a1ffad4644a7aa55839c5163ff142c9

          SHA1

          fa59681102b5549bfa913d5bdb654a66da231491

          SHA256

          3df334ba9d737a7eb064f5ec8284e60a712c42cd65a9fbf3c5b8a8f468cbf3f6

          SHA512

          1d7db9015f20f4ee2e388ff42803e6b3d4868a4e3abe56f90f57258bddef1cb14ac5341712dbd1e67250001fa60bbb14c2958b383cd3299325fb9ddb4802cd8b

        • memory/3436-17-0x0000000002230000-0x00000000022BE000-memory.dmp

          Filesize

          568KB

        • memory/3436-18-0x00000000022D0000-0x00000000022D1000-memory.dmp

          Filesize

          4KB

        • memory/3436-23-0x0000000000400000-0x0000000000450000-memory.dmp

          Filesize

          320KB

        • memory/5056-0-0x0000000002CF0000-0x0000000002CF1000-memory.dmp

          Filesize

          4KB

        • memory/5056-21-0x0000000000400000-0x0000000000AB4000-memory.dmp

          Filesize

          6.7MB