Analysis

  • max time kernel
    141s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/04/2024, 21:26

General

  • Target

    7fc5206a27de6c86a93f6a6d3918af0c7b850647efa8b279600c67f5b3b34e0f.exe

  • Size

    1.2MB

  • MD5

    90dadb3e75df9547aa5743575ca0dd36

  • SHA1

    d98780eba073ca35cfb6904deb88e19ba65b5a34

  • SHA256

    7fc5206a27de6c86a93f6a6d3918af0c7b850647efa8b279600c67f5b3b34e0f

  • SHA512

    c914dcbde55665e97ba00ff1bf2c941f57cfb881bab524855071bd83c310d4cabd4be1981b0443df555100998266a2c0eeb7eeee717fb39543a4da7c328ea45e

  • SSDEEP

    24576:gjFtxhQ1FWTiIskCM0oY4Kq+mLNa4yWYKhD28:gwUOzJoYhuLkXWYF8

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops desktop.ini file(s) 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Kills process with taskkill 15 IoCs
  • Modifies Internet Explorer settings 1 TTPs 25 IoCs
  • Modifies data under HKEY_USERS 7 IoCs
  • Modifies registry class 23 IoCs
  • Modifies registry key 1 TTPs 2 IoCs
  • Runs net.exe
  • Suspicious use of AdjustPrivilegeToken 24 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fc5206a27de6c86a93f6a6d3918af0c7b850647efa8b279600c67f5b3b34e0f.exe
    "C:\Users\Admin\AppData\Local\Temp\7fc5206a27de6c86a93f6a6d3918af0c7b850647efa8b279600c67f5b3b34e0f.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1348
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im TslGame.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4620
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im TslGame_BE.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3792
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im TslGame_UC.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4752
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im TslGame_ZK.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3064
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im ExecPubg.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3640
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im BEService.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1284
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im BEService_x64.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1632
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im BroCrashReporter.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:1216
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im ucldr_battlegrounds_gl.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4344
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im reporter.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4408
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im wscript.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4084
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im iigw_server.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4168
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im Fondue.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:4968
    • C:\Windows\SysWOW64\taskkill.exe
      taskkill /im zksvc.exe /f
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:620
    • C:\Windows\SysWOW64\Rundll32.exe
      Rundll32 InetCpl.cpl,ClearMyTracksByProcess 255
      2⤵
      • Checks computer location settings
      • Modifies Internet Explorer settings
      • Modifies data under HKEY_USERS
      • Suspicious use of FindShellTrayWindow
      PID:3844
      • C:\Program Files (x86)\Internet Explorer\iexplore.exe
        "C:\Program Files (x86)\Internet Explorer\iexplore.exe" -ResetDestinationList
        3⤵
          PID:4640
        • C:\Windows\SysWOW64\rundll32.exe
          C:\Windows\system32\rundll32.exe C:\Windows\system32\inetcpl.cpl,ClearMyTracksByProcess Flags:255 WinX:0 WinY:0 IEFrame:00000000
          3⤵
          • Drops desktop.ini file(s)
          • Modifies Internet Explorer settings
          • Modifies data under HKEY_USERS
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          PID:936
      • C:\Windows\SysWOW64\reg.exe
        reg delete HKLM\SYSTEM\CurrentControlSet\Services\eamonm /f
        2⤵
        • Modifies registry key
        PID:3520
      • C:\Windows\SysWOW64\reg.exe
        reg delete HKLM\SYSTEM\CurrentControlSet\Services\edevmon /f
        2⤵
        • Modifies registry key
        PID:1436
      • C:\Windows\SysWOW64\net.exe
        net stop BEService
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5084
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 stop BEService
          3⤵
            PID:5012
        • C:\Windows\SysWOW64\net.exe
          net stop BEDaisy
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3160
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop BEDaisy
            3⤵
              PID:416
          • C:\Windows\SysWOW64\taskkill.exe
            taskkill /im 360chrome.exe /f
            2⤵
            • Kills process with taskkill
            • Suspicious use of AdjustPrivilegeToken
            PID:4380
        • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
          "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3816 --field-trial-handle=3240,i,13319578961094268484,16557498665191861597,262144 --variations-seed-version /prefetch:8
          1⤵
            PID:4820

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Packages\windows_ie_ac_001\AC\INetHistory\desktop.ini

            Filesize

            130B

            MD5

            941682911c20b2dabecb20476f91c98a

            SHA1

            0b0becf019cb15e75cdfa23bf0d4cb976f109baa

            SHA256

            3fef99e07b0455f88a5bb59e83329d0bfcebe078d907985d0abf70be26b9b89a

            SHA512

            a12f5caf5fd39cf2ae600e4378b9296d07787a83ae76bc410b89182a2f8e3202c4ca80d811d548193dff439541de9447f9fa141ebfd771e7ab7a6053cb4af2b3