Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-04-2024 03:58

General

  • Target

    adf54f40e19b21650c4e7a38f36fc4ae0fac40aebdbb7146bafd8c9428a7bce0.exe

  • Size

    197KB

  • MD5

    69c4b08620c2b695c501f0f16d110aed

  • SHA1

    97a7bbfc748205cfb89bccecfe2d8b04f84ca201

  • SHA256

    adf54f40e19b21650c4e7a38f36fc4ae0fac40aebdbb7146bafd8c9428a7bce0

  • SHA512

    82f6d7d28cf86ff3fff104f5d057bbf7660d16028dd57915568b591b7dce65db86b69b3a9177e6e6f455a1f3084cf0df74937c23466772b3dab30077ff4ae07c

  • SSDEEP

    6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOF:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXo

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adf54f40e19b21650c4e7a38f36fc4ae0fac40aebdbb7146bafd8c9428a7bce0.exe
    "C:\Users\Admin\AppData\Local\Temp\adf54f40e19b21650c4e7a38f36fc4ae0fac40aebdbb7146bafd8c9428a7bce0.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3268
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\ADF54F~1.EXE > nul
      2⤵
        PID:4320
    • C:\Windows\Debug\lwshost.exe
      C:\Windows\Debug\lwshost.exe
      1⤵
      • Executes dropped EXE
      • Checks processor information in registry
      PID:4272

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\debug\lwshost.exe

      Filesize

      197KB

      MD5

      c5e3857a79d7a9d773abb09248cc28a5

      SHA1

      826e96b0717b4d9edab17e041c13621fad361df1

      SHA256

      6a995d0ca7d3a2af169f279025379c59a6cd472430162f1e420ae9462814188d

      SHA512

      3fb526deb7bdf71922d09958e36a7f17193781d3547a7a823fb8aca8d9043940cdb7cc5dfe44a121cc1eb53fba461477c12ba4a97cc5382dd5fb47e83b644877