Analysis

  • max time kernel
    141s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/04/2024, 20:17

General

  • Target

    a3bd5e5538c1d97608d726deec76249cbec22962b6c86f6b727c7b5222ed0c69.exe

  • Size

    198KB

  • MD5

    bb90e2e55198bb82b96b6aa129626a7d

  • SHA1

    f2225dc69cc8f05c938beede8cb3256619f17f1f

  • SHA256

    a3bd5e5538c1d97608d726deec76249cbec22962b6c86f6b727c7b5222ed0c69

  • SHA512

    63fe2e2c0d392bb8bd666c559dc0efd7f35eb39ddd110ad19221876612cac57a7379af03714df295093ccbdcbf49a1a23689651809e8373bd2aba1c1030e6f77

  • SSDEEP

    6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOE:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXl

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3bd5e5538c1d97608d726deec76249cbec22962b6c86f6b727c7b5222ed0c69.exe
    "C:\Users\Admin\AppData\Local\Temp\a3bd5e5538c1d97608d726deec76249cbec22962b6c86f6b727c7b5222ed0c69.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:5004
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A3BD5E~1.EXE > nul
      2⤵
        PID:1396
    • C:\Windows\Debug\jkmhost.exe
      C:\Windows\Debug\jkmhost.exe
      1⤵
      • Executes dropped EXE
      PID:1964

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\debug\jkmhost.exe

      Filesize

      198KB

      MD5

      f00a7a862237b2249e7ca9976b96bd90

      SHA1

      56984451c2e8a3fcdbd1a545d980344ec3755041

      SHA256

      39f7543c337d7f4908de31907e9da404a8447da53c1a06db131d0e8b3876bf0d

      SHA512

      f7d1ff02608e5c8536c3884cae36bb807adbcb343b21d8888e3c5a3b8d1633025fd294049fa2f1f294150fb50f38304ef102b29cb7caf25b4f0f0ea679d49f0d