Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/04/2024, 15:04

General

  • Target

    pn.exe

  • Size

    965KB

  • MD5

    2e59df57056cb7265bf9a9906a82e9b5

  • SHA1

    6b473b2d49de1e9a27b6bb16e911cafe560d006c

  • SHA256

    582a359a06d6306eaf4b289f284a6c7da778484aeb1a0690c55c815e1c07a1ee

  • SHA512

    2ee3c1f2ad61d2266e22f2425766a5aec3fd10cc768e5bfd35115bd45f26edb3dda0fa89708324652baa24df75694d4acd7d2e751d9894611dde37a5d1b3d53b

  • SSDEEP

    12288:vJX4v0P5DOTwK/qOhY5WAqvWL6oQKaDCaTy0E9k10zotnHh83dWKh3AT0E5D:vBX9+Kf6jKauaTZMiHhqWKZA

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\pn.exe
    "C:\Users\Admin\AppData\Local\Temp\pn.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:3632
    • C:\Windows\SysWOW64\dllhost.exe
      dllhost.exe
      2⤵
        PID:4156
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c cmd < Ora.tif
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:616
        • C:\Windows\SysWOW64\cmd.exe
          cmd
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2196
          • C:\Windows\SysWOW64\findstr.exe
            findstr /V /R "^riubUwhJVBcAWxPbDOSEYgKBaLKelDDKVoOIIXjPsUNHnzwOpkOcJtQPbFyodknaYLENFuOFCehtBeeYKVTZOiqQaZkrRrnucxJNOhoevoTGRLhxDunxsmDQKNcGULNnEuIuzg$" Poi.tif
            4⤵
              PID:1820
            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Esistenza.exe.com
              Esistenza.exe.com Z
              4⤵
              • Executes dropped EXE
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of SendNotifyMessage
              • Suspicious use of WriteProcessMemory
              PID:2780
              • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Esistenza.exe.com
                C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Esistenza.exe.com Z
                5⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Checks processor information in registry
                • Modifies registry class
                • Suspicious use of FindShellTrayWindow
                • Suspicious use of SendNotifyMessage
                • Suspicious use of WriteProcessMemory
                PID:2960
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\pojrodfwwep.vbs"
                  6⤵
                  • Blocklisted process makes network request
                  PID:4844
            • C:\Windows\SysWOW64\PING.EXE
              ping localhost -n 30
              4⤵
              • Runs ping.exe
              PID:4956

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\1C9C.tmp

              Filesize

              297B

              MD5

              bd0c2d8e6b0fe0de4a3869c02ee43a85

              SHA1

              21d8cca90ea489f88c2953156e6c3dec6945388b

              SHA256

              3a3e433f615f99529721ee766ad453b75d73fe213cb1ab74ccbb4c0e32dcd533

              SHA512

              496b1285f1e78d50dd79b05fa2cbf4a0b655bb3e4515646be3a7c7cdf85d7db6ab35577aa1e294f3d515d707ca341652b5ae9d4b22197e4480226ef8440294b6

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Cui.tif

              Filesize

              139KB

              MD5

              f0b4f2be629c1200116f93db3cdf0868

              SHA1

              497ec65d2fd55e5e55a512276aa44d606b30e3df

              SHA256

              95c72f4f5e0b834a0aedcfd804dce6fa3f9d178756ead9015e15acee9f30c8de

              SHA512

              f77f38247952d6f21f1d5bcc2a203e9d3ca1d4df2b57c0067baae1e16439fbed6434a93be04fdfa405043d7b7300a4ee99d26ef8b73d26f5b359151acdebbb00

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Esistenza.exe.com

              Filesize

              872KB

              MD5

              c56b5f0201a3b3de53e561fe76912bfd

              SHA1

              2a4062e10a5de813f5688221dbeb3f3ff33eb417

              SHA256

              237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

              SHA512

              195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ora.tif

              Filesize

              520B

              MD5

              2b01aacb646ebfc44f2e1e479735fda8

              SHA1

              a86a3a3029b63b758b641812d9293dcb7a264981

              SHA256

              7847fb21cff01ce0a99eaeae0d46d48bd39d556bdfcc46ba7cd9906de0c2a420

              SHA512

              859333f012b37649fafc0c4318de30f5e5e1002b1a575ce9d197444f3682ba817e1e151d8aba1608a23946f0adae10431926ba8e60301fbeb5df7b4cd6724b5a

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Ove.tif

              Filesize

              697KB

              MD5

              eb38b72baef5c44e96f939c9f0909256

              SHA1

              e2b0dadd14ac172b5a42cb51428f4c70d2bcbedc

              SHA256

              f49efb6f2d8f46ee1bb971450e930f2018668cda103338abfbf16f3b806afb87

              SHA512

              5f0cb16966c20841c33e7c20311fa01b7247b42659c30a432783ff133dbf3e8da417708c4b7822a3b171ed9a5128574112c5a28de3c9104ef9d105264768fc9a

            • C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Poi.tif

              Filesize

              872KB

              MD5

              d5a0a9ee1b5cf11c5c4deb0a3181841e

              SHA1

              6f61c6c775c57f7d2fde6ee8dada897996c046c8

              SHA256

              9e84d447e57bd729e500a0a4df6941502fd2a05eb5eca5e7b6d022547d922487

              SHA512

              e0676ac7c72860433fdbfa96201a8fb829a761b204c30cb991672465edac9eb294a535f96bb9f4d5383b246ca6b80c8cf3d9a59127c023a24f818ffd189e40f3

            • C:\Users\Admin\AppData\Local\Temp\pojrodfwwep.vbs

              Filesize

              139B

              MD5

              f04d78f3bf382b7c4dfe34ec4a25550f

              SHA1

              e580a3871fb8fb52abe681aa144b5a8e43abb6f4

              SHA256

              7bfd2ea3a2f9bf23e6c9265b9c4bd2c45ccb6e93db83d373960253b07ff39c3e

              SHA512

              62954dbadda43168110c5d17895b60dc6f69e525ddec4df3c12906cbe4344cbab98e404861c851a8647a05e57c766e92e7bef9155c8fbacf0a19e50ddecba305

            • memory/2960-25-0x0000000004650000-0x0000000004677000-memory.dmp

              Filesize

              156KB

            • memory/2960-24-0x0000000004650000-0x0000000004677000-memory.dmp

              Filesize

              156KB

            • memory/2960-26-0x0000000004650000-0x0000000004677000-memory.dmp

              Filesize

              156KB

            • memory/2960-27-0x0000000004650000-0x0000000004677000-memory.dmp

              Filesize

              156KB

            • memory/2960-28-0x0000000004650000-0x0000000004677000-memory.dmp

              Filesize

              156KB

            • memory/2960-29-0x0000000004650000-0x0000000004677000-memory.dmp

              Filesize

              156KB

            • memory/2960-23-0x0000000004650000-0x0000000004677000-memory.dmp

              Filesize

              156KB

            • memory/2960-41-0x0000000004650000-0x0000000004677000-memory.dmp

              Filesize

              156KB

            • memory/2960-22-0x0000000004640000-0x0000000004641000-memory.dmp

              Filesize

              4KB