Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-04-2024 16:42

General

  • Target

    svchost.exe

  • Size

    749KB

  • MD5

    a6479dae68115fad0a37c5fb33becf99

  • SHA1

    398663b27c9297a884c800aa64916c976638a036

  • SHA256

    441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb

  • SHA512

    aa3dc1b98aa53708a2b9834fb3dc0585ae5deffa168fe65d2aff3d80f4b0849c41d3cbd37e306ac6bfbfe5689e8c625828c93453fd21d5f7ecc0b16ad85f7452

  • SSDEEP

    12288:Cv2E2CrJF9srANfrX8QoN2e9YxzKapgg3e8SIa+9j8CfL6qd8kAXDbvDYD:jE2CrJdNfjrfJ+aX3e8DaOj8wL6e

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 9 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 8 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Runs ping.exe 1 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:264
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FC0UcdkYVv.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4644
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:1536
        • C:\Windows\system32\w32tm.exe
          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
          3⤵
            PID:3396
          • C:\Windows\Globalization\Idle.exe
            "C:\Windows\Globalization\Idle.exe"
            3⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3748
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\W1ZleRNNoI.bat"
              4⤵
              • Suspicious use of WriteProcessMemory
              PID:4312
              • C:\Windows\system32\chcp.com
                chcp 65001
                5⤵
                  PID:3204
                • C:\Windows\system32\PING.EXE
                  ping -n 10 localhost
                  5⤵
                  • Runs ping.exe
                  PID:1392
                • C:\Windows\Globalization\Idle.exe
                  "C:\Windows\Globalization\Idle.exe"
                  5⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Modifies registry class
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:4536
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NiOMBGhh72.bat"
                    6⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3600
                    • C:\Windows\system32\chcp.com
                      chcp 65001
                      7⤵
                        PID:1616
                      • C:\Windows\system32\w32tm.exe
                        w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                        7⤵
                          PID:1988
                        • C:\Windows\Globalization\Idle.exe
                          "C:\Windows\Globalization\Idle.exe"
                          7⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Modifies registry class
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:5104
                          • C:\Windows\System32\cmd.exe
                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\W1ZleRNNoI.bat"
                            8⤵
                            • Suspicious use of WriteProcessMemory
                            PID:1724
                            • C:\Windows\system32\chcp.com
                              chcp 65001
                              9⤵
                                PID:4248
                              • C:\Windows\system32\PING.EXE
                                ping -n 10 localhost
                                9⤵
                                • Runs ping.exe
                                PID:4460
                              • C:\Windows\Globalization\Idle.exe
                                "C:\Windows\Globalization\Idle.exe"
                                9⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Modifies registry class
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:1404
                                • C:\Windows\System32\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ruhG0OcHGE.bat"
                                  10⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:2388
                                  • C:\Windows\system32\chcp.com
                                    chcp 65001
                                    11⤵
                                      PID:4360
                                    • C:\Windows\system32\PING.EXE
                                      ping -n 10 localhost
                                      11⤵
                                      • Runs ping.exe
                                      PID:1816
                                    • C:\Windows\Globalization\Idle.exe
                                      "C:\Windows\Globalization\Idle.exe"
                                      11⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Modifies registry class
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:1532
                                      • C:\Windows\System32\cmd.exe
                                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\NiOMBGhh72.bat"
                                        12⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:2520
                                        • C:\Windows\system32\chcp.com
                                          chcp 65001
                                          13⤵
                                            PID:4832
                                          • C:\Windows\system32\w32tm.exe
                                            w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                            13⤵
                                              PID:4472
                                            • C:\Windows\Globalization\Idle.exe
                                              "C:\Windows\Globalization\Idle.exe"
                                              13⤵
                                              • Checks computer location settings
                                              • Executes dropped EXE
                                              • Modifies registry class
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of WriteProcessMemory
                                              PID:2228
                                              • C:\Windows\System32\cmd.exe
                                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\OwDUg2gYJx.bat"
                                                14⤵
                                                • Suspicious use of WriteProcessMemory
                                                PID:4420
                                                • C:\Windows\system32\chcp.com
                                                  chcp 65001
                                                  15⤵
                                                    PID:4928
                                                  • C:\Windows\system32\PING.EXE
                                                    ping -n 10 localhost
                                                    15⤵
                                                    • Runs ping.exe
                                                    PID:3644
                                                  • C:\Windows\Globalization\Idle.exe
                                                    "C:\Windows\Globalization\Idle.exe"
                                                    15⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Modifies registry class
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:3916
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\ruhG0OcHGE.bat"
                                                      16⤵
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:4480
                                                      • C:\Windows\system32\chcp.com
                                                        chcp 65001
                                                        17⤵
                                                          PID:2460
                                                        • C:\Windows\system32\PING.EXE
                                                          ping -n 10 localhost
                                                          17⤵
                                                          • Runs ping.exe
                                                          PID:1172
                                                        • C:\Windows\Globalization\Idle.exe
                                                          "C:\Windows\Globalization\Idle.exe"
                                                          17⤵
                                                          • Checks computer location settings
                                                          • Executes dropped EXE
                                                          • Modifies registry class
                                                          • Suspicious use of AdjustPrivilegeToken
                                                          PID:4804
                                                          • C:\Windows\System32\cmd.exe
                                                            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\qgs8WdcQ4J.bat"
                                                            18⤵
                                                              PID:3584
                                                              • C:\Windows\system32\chcp.com
                                                                chcp 65001
                                                                19⤵
                                                                  PID:1420
                                                                • C:\Windows\system32\PING.EXE
                                                                  ping -n 10 localhost
                                                                  19⤵
                                                                  • Runs ping.exe
                                                                  PID:3100

                            Network

                            MITRE ATT&CK Matrix ATT&CK v13

                            Discovery

                            Query Registry

                            1
                            T1012

                            System Information Discovery

                            2
                            T1082

                            Remote System Discovery

                            1
                            T1018

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Idle.exe.log
                              Filesize

                              1KB

                              MD5

                              6060462f0131e17459549582a33147bf

                              SHA1

                              ca110cc4856a558e2917bd4475456c31151ab819

                              SHA256

                              0adc7638b7470f67db0dbc5309aaf8bf99745f00f30a843eec5038410b828e5c

                              SHA512

                              d6c50b7c0439afb5328ac0ab49b186a2deba356d52200860122c30f291987cbe79d4d3ae7d60a24f2bcefb2125f3748f67ee45ff274da6bcf9b4decff3f3bdef

                            • C:\Users\Admin\AppData\Local\Temp\FC0UcdkYVv.bat
                              Filesize

                              209B

                              MD5

                              981f1f4817f90724a1fb63b0673391f8

                              SHA1

                              ec86725689b01d3597c66c82c2de862952fce6ca

                              SHA256

                              7ed1baa91e710b8c444d9f81f6b4d61a0c5aa21a763db6126354d228ca7a3013

                              SHA512

                              68f987ff247eedbcb64cb1b1c0d3b35913ccb9375633ff531ad8ee1c3c64ff1a9f4dbdc5c3d54221d91efaa06a02bb323c403245ca6920385a4118125aca25f3

                            • C:\Users\Admin\AppData\Local\Temp\NiOMBGhh72.bat
                              Filesize

                              209B

                              MD5

                              e7ec4a0f430226cac7e808934c79ac49

                              SHA1

                              fcefdc394bea62585303d3926c4e56c3cb439028

                              SHA256

                              c9e0d9297b9401c2c89cc8392e903453e9bf749149f8bb262b40492e36dcd704

                              SHA512

                              7733d50061d7b7db9ddc029f643d82f2e5bd828d474224e2f40be42c929bbbe46eafb54f1645560280c751849b5b4109dabdc53c310a32adc508e922e8acc345

                            • C:\Users\Admin\AppData\Local\Temp\OwDUg2gYJx.bat
                              Filesize

                              161B

                              MD5

                              4f61dc5e560b473ebea617c7182bb350

                              SHA1

                              6217fa56e63f096d3c7fc94d2a3eca539fa3a4a5

                              SHA256

                              2e5504c469878807b7446a93b785df79f60fe7eb3d9e3e706a72cac27dd38458

                              SHA512

                              6fd8c9a1ed73bc61e31bd678716aa48593904fbcc1bd7dfc665a45287de8ca9f08d06a954e2da9817e3c64a49748416cc688465bcddd1be161a898cb33c578f8

                            • C:\Users\Admin\AppData\Local\Temp\W1ZleRNNoI.bat
                              Filesize

                              161B

                              MD5

                              f147400928880e56c2d49f43e5a68ab5

                              SHA1

                              7c0a95c4ce36ff19b82bd3cd5cd2ce2b26f4890a

                              SHA256

                              aaeeb1b212f125f414e77299aec9a9d5d631e3d81a3b23dd93e92008cd4c0657

                              SHA512

                              46aa61a637ea6eef591ff9d654dff5de8eaf3c34e4b051bae57c80aced38599a7323b37a6762b8991d2f518c8b33127471228efd380ba0fb3a1a4f64cf6b5e28

                            • C:\Users\Admin\AppData\Local\Temp\qgs8WdcQ4J.bat
                              Filesize

                              161B

                              MD5

                              d5f53365035871ede950570a9287d1c4

                              SHA1

                              56db1770a2581ea5b47318560bef80fe7e07c38f

                              SHA256

                              df2d1d48614841c0ceb3776f26cf96067e7cfa84c99f655b6a895cc304061b36

                              SHA512

                              7720e7fd401c9184b47ea283e29798ffb8c08878da6c815647c7f0e1c1c0e43effa749b7b8e97f57cb7c02cb1f6a59edd0be4dd0145c3b9a4320a3c71393d6ce

                            • C:\Users\Admin\AppData\Local\Temp\ruhG0OcHGE.bat
                              Filesize

                              161B

                              MD5

                              f5b27f037012cbc66a63e8e04981ba3b

                              SHA1

                              e8c92926e16afa132cb9e7070776440e1cc168ff

                              SHA256

                              7e9c2407930c0c964dd37783272a51097ddbc34c6d79b834d6b0d0fd603c305b

                              SHA512

                              367b3d42d87350994390b75f15e000a22dc1d4ba3b755ddaf93965c9cbfd163a32a1185b2b4c7232d60142638092e5402de2066c0421a57b5eb8329c2f3f9961

                            • C:\Users\Default\AppData\Roaming\Microsoft\Windows\Printer Shortcuts\RuntimeBroker.exe
                              Filesize

                              749KB

                              MD5

                              a6479dae68115fad0a37c5fb33becf99

                              SHA1

                              398663b27c9297a884c800aa64916c976638a036

                              SHA256

                              441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb

                              SHA512

                              aa3dc1b98aa53708a2b9834fb3dc0585ae5deffa168fe65d2aff3d80f4b0849c41d3cbd37e306ac6bfbfe5689e8c625828c93453fd21d5f7ecc0b16ad85f7452

                            • memory/264-30-0x00007FFE42250000-0x00007FFE42269000-memory.dmp
                              Filesize

                              100KB

                            • memory/264-8-0x00007FFE4FC30000-0x00007FFE4FC31000-memory.dmp
                              Filesize

                              4KB

                            • memory/264-12-0x000001824F000000-0x000001824F018000-memory.dmp
                              Filesize

                              96KB

                            • memory/264-31-0x00007FFE33BC0000-0x00007FFE34681000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/264-0-0x0000018233550000-0x0000018233612000-memory.dmp
                              Filesize

                              776KB

                            • memory/264-29-0x00007FFE51BF0000-0x00007FFE51DE5000-memory.dmp
                              Filesize

                              2.0MB

                            • memory/264-9-0x000001824F050000-0x000001824F0A0000-memory.dmp
                              Filesize

                              320KB

                            • memory/264-1-0x000001824DCD0000-0x000001824DD8E000-memory.dmp
                              Filesize

                              760KB

                            • memory/264-2-0x00007FFE33BC0000-0x00007FFE34681000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/264-4-0x000001824DDA0000-0x000001824DDAE000-memory.dmp
                              Filesize

                              56KB

                            • memory/264-5-0x00007FFE4FC40000-0x00007FFE4FC41000-memory.dmp
                              Filesize

                              4KB

                            • memory/264-7-0x000001824DDD0000-0x000001824DDEC000-memory.dmp
                              Filesize

                              112KB

                            • memory/264-10-0x00007FFE4FC20000-0x00007FFE4FC21000-memory.dmp
                              Filesize

                              4KB

                            • memory/3748-48-0x00007FFE33BC0000-0x00007FFE34681000-memory.dmp
                              Filesize

                              10.8MB

                            • memory/3748-49-0x00007FFE51BF0000-0x00007FFE51DE5000-memory.dmp
                              Filesize

                              2.0MB

                            • memory/3748-47-0x00007FFE42250000-0x00007FFE42269000-memory.dmp
                              Filesize

                              100KB

                            • memory/3748-41-0x00007FFE51BF0000-0x00007FFE51DE5000-memory.dmp
                              Filesize

                              2.0MB

                            • memory/3748-37-0x000001B672E80000-0x000001B672E90000-memory.dmp
                              Filesize

                              64KB

                            • memory/3748-36-0x00007FFE33BC0000-0x00007FFE34681000-memory.dmp
                              Filesize

                              10.8MB