Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/04/2024, 18:07
Static task
static1
Behavioral task
behavioral1
Sample
f5245ad61b4e0c85c3a7e5f1d835e43d334fcb4d5f5aa0b8a5b0405ee3bfb6b6.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f5245ad61b4e0c85c3a7e5f1d835e43d334fcb4d5f5aa0b8a5b0405ee3bfb6b6.exe
Resource
win10v2004-20240226-en
General
-
Target
f5245ad61b4e0c85c3a7e5f1d835e43d334fcb4d5f5aa0b8a5b0405ee3bfb6b6.exe
-
Size
2.1MB
-
MD5
865554ed822848c29ccc151c3a9e9087
-
SHA1
9b3838023e211b4937b37bb578129ed02d1d4b0e
-
SHA256
f5245ad61b4e0c85c3a7e5f1d835e43d334fcb4d5f5aa0b8a5b0405ee3bfb6b6
-
SHA512
ec81c02d7bbb7130505caf003ca1e131d3451fc10bb7de55525ccdd26a18b715070de1cbc5f75b594ca00c7a908fbff603caa0c7eeea488035a7f2562498e6ae
-
SSDEEP
49152:j5219/B28j5219/BUxXrHTkdEFzdHMfgLV4dSmwISz5niVdpFV:jG952UG95UxPkdEFRsfgLmST/ViVdd
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\system32\drivers\etc\hosts attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation f5245ad61b4e0c85c3a7e5f1d835e43d334fcb4d5f5aa0b8a5b0405ee3bfb6b6.exe -
Executes dropped EXE 1 IoCs
pid Process 1492 SUPORTE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 16 IoCs
pid Process 1544 timeout.exe 1468 timeout.exe 1440 timeout.exe 4544 timeout.exe 3408 timeout.exe 1204 timeout.exe 2376 timeout.exe 3692 timeout.exe 980 timeout.exe 4852 timeout.exe 500 timeout.exe 2516 timeout.exe 4444 timeout.exe 3440 timeout.exe 2424 timeout.exe 1404 timeout.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 4484 wrote to memory of 4712 4484 f5245ad61b4e0c85c3a7e5f1d835e43d334fcb4d5f5aa0b8a5b0405ee3bfb6b6.exe 91 PID 4484 wrote to memory of 4712 4484 f5245ad61b4e0c85c3a7e5f1d835e43d334fcb4d5f5aa0b8a5b0405ee3bfb6b6.exe 91 PID 4712 wrote to memory of 2952 4712 cmd.exe 94 PID 4712 wrote to memory of 2952 4712 cmd.exe 94 PID 4712 wrote to memory of 1208 4712 cmd.exe 95 PID 4712 wrote to memory of 1208 4712 cmd.exe 95 PID 4712 wrote to memory of 2368 4712 cmd.exe 96 PID 4712 wrote to memory of 2368 4712 cmd.exe 96 PID 4484 wrote to memory of 1492 4484 f5245ad61b4e0c85c3a7e5f1d835e43d334fcb4d5f5aa0b8a5b0405ee3bfb6b6.exe 97 PID 4484 wrote to memory of 1492 4484 f5245ad61b4e0c85c3a7e5f1d835e43d334fcb4d5f5aa0b8a5b0405ee3bfb6b6.exe 97 PID 4484 wrote to memory of 2480 4484 f5245ad61b4e0c85c3a7e5f1d835e43d334fcb4d5f5aa0b8a5b0405ee3bfb6b6.exe 98 PID 4484 wrote to memory of 2480 4484 f5245ad61b4e0c85c3a7e5f1d835e43d334fcb4d5f5aa0b8a5b0405ee3bfb6b6.exe 98 PID 2480 wrote to memory of 2100 2480 cmd.exe 100 PID 2480 wrote to memory of 2100 2480 cmd.exe 100 PID 2480 wrote to memory of 980 2480 cmd.exe 101 PID 2480 wrote to memory of 980 2480 cmd.exe 101 PID 2480 wrote to memory of 2516 2480 cmd.exe 102 PID 2480 wrote to memory of 2516 2480 cmd.exe 102 PID 2480 wrote to memory of 1544 2480 cmd.exe 104 PID 2480 wrote to memory of 1544 2480 cmd.exe 104 PID 2480 wrote to memory of 1468 2480 cmd.exe 105 PID 2480 wrote to memory of 1468 2480 cmd.exe 105 PID 2480 wrote to memory of 1440 2480 cmd.exe 106 PID 2480 wrote to memory of 1440 2480 cmd.exe 106 PID 2480 wrote to memory of 4444 2480 cmd.exe 107 PID 2480 wrote to memory of 4444 2480 cmd.exe 107 PID 2480 wrote to memory of 4852 2480 cmd.exe 110 PID 2480 wrote to memory of 4852 2480 cmd.exe 110 PID 2480 wrote to memory of 2376 2480 cmd.exe 113 PID 2480 wrote to memory of 2376 2480 cmd.exe 113 PID 2480 wrote to memory of 3440 2480 cmd.exe 114 PID 2480 wrote to memory of 3440 2480 cmd.exe 114 PID 2480 wrote to memory of 3692 2480 cmd.exe 115 PID 2480 wrote to memory of 3692 2480 cmd.exe 115 PID 2480 wrote to memory of 500 2480 cmd.exe 117 PID 2480 wrote to memory of 500 2480 cmd.exe 117 PID 2480 wrote to memory of 2424 2480 cmd.exe 118 PID 2480 wrote to memory of 2424 2480 cmd.exe 118 PID 2480 wrote to memory of 4544 2480 cmd.exe 119 PID 2480 wrote to memory of 4544 2480 cmd.exe 119 PID 2480 wrote to memory of 1404 2480 cmd.exe 122 PID 2480 wrote to memory of 1404 2480 cmd.exe 122 PID 2480 wrote to memory of 3408 2480 cmd.exe 123 PID 2480 wrote to memory of 3408 2480 cmd.exe 123 PID 2480 wrote to memory of 1204 2480 cmd.exe 124 PID 2480 wrote to memory of 1204 2480 cmd.exe 124 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 1208 attrib.exe 2368 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5245ad61b4e0c85c3a7e5f1d835e43d334fcb4d5f5aa0b8a5b0405ee3bfb6b6.exe"C:\Users\Admin\AppData\Local\Temp\f5245ad61b4e0c85c3a7e5f1d835e43d334fcb4d5f5aa0b8a5b0405ee3bfb6b6.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Addon\Arquivos de Programas\Adicionais\PRIVATE-USER.cmd" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"3⤵PID:2952
-
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\system32\drivers\etc\hosts3⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:1208
-
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\system32\drivers\etc\hosts3⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:2368
-
-
-
C:\Users\Admin\AppData\Local\Temp\Addon\Arquivos de Programas\Adicionais\SUPORTE.exe"C:\Users\Admin\AppData\Local\Temp\Addon\Arquivos de Programas\Adicionais\SUPORTE.exe"2⤵
- Executes dropped EXE
PID:1492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Addon\Arquivos de Programas\Adicionais\ACTIVATED.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\system32\mode.commode con: cols=80 lines=103⤵PID:2100
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:980
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:2516
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:1544
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:1468
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:1440
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:4444
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:4852
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:2376
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:3440
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:3692
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:500
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:2424
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:4544
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:1404
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:3408
-
-
C:\Windows\system32\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:1204
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3756 --field-trial-handle=2900,i,14549994492153927475,12895178890800740987,262144 --variations-seed-version /prefetch:81⤵PID:2960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
641B
MD5d6ac638f591dba96bbf9e33faf401f29
SHA142631098992a88920732cbc9eee0ee72d65f84d0
SHA256e8220d84abad5ce2362917f6a0f1a213fc4e65f72c7a5284bbd95cf453175ca0
SHA512d99d185bbaa7b1cc3f9a8ccdc7c63d00db1a309a1d1aff8f8c714acba47432569183acab52187d49abf2c62b2c31fa8cb4c69123344ec80c3f1853ec2b4b064d
-
Filesize
9KB
MD50c739d0021c968abbd85ac72f1109754
SHA1e4fb728296286bb927e33558d0f70f8d07fda6ac
SHA2569057f37af86063ffc0d4c553e418f25888090ed6be97790f46556626edfc698b
SHA512ff45765783d7bbf63a44dd853373d93df7676afd5c36e9bd74b746ce92c365a66cc8ba356536c96262e2a9181e9331cf87f34e2ad94795501f18295c211feead
-
Filesize
1.6MB
MD557e31a60a690725dc65c2fb6e9b21762
SHA19d2f2c166e828b9a73a23253d2e64a05e4a27d60
SHA2564d296e115922566a3e56afcea77eb9a436c1b70ec84c32f047ffd866940b1b16
SHA51270f48d81e59f38518813b60fe93fc34e5944fea0254def03f8ea17e78c5ba686f5a31ca025075cd43e02745d843408e7df5db54be11663d9a45410a031aa68fb
-
Filesize
8KB
MD5246299d2385306132314f36346f0a642
SHA1825b9b675bcb1f991be778c429ab1bcdb26ba832
SHA256149640bff7e404334999f040576ea3dbebee0e3203ac761898591669c305e88a
SHA5126239fd5820cc365a8842073c836e24a8fe92843e538bea876fd61da389e79031582e1a7bc26d92ae20fce535961ad63184cda2f4267cce5d1feb1b857a29fc63