Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-04-2024 01:41

General

  • Target

    441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe

  • Size

    749KB

  • MD5

    a6479dae68115fad0a37c5fb33becf99

  • SHA1

    398663b27c9297a884c800aa64916c976638a036

  • SHA256

    441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb

  • SHA512

    aa3dc1b98aa53708a2b9834fb3dc0585ae5deffa168fe65d2aff3d80f4b0849c41d3cbd37e306ac6bfbfe5689e8c625828c93453fd21d5f7ecc0b16ad85f7452

  • SSDEEP

    12288:Cv2E2CrJF9srANfrX8QoN2e9YxzKapgg3e8SIa+9j8CfL6qd8kAXDbvDYD:jE2CrJdNfjrfJ+aX3e8DaOj8wL6e

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 1 IoCs
  • Runs ping.exe 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe
    "C:\Users\Admin\AppData\Local\Temp\441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb.exe"
    1⤵
    • Checks computer location settings
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1636
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\FfJ3CHVJLN.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3628
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:4464
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • Runs ping.exe
          PID:2452
        • C:\Users\Admin\System.exe
          "C:\Users\Admin\System.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: GetForegroundWindowSpam
          • Suspicious use of AdjustPrivilegeToken
          PID:4748

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\FfJ3CHVJLN.bat

      Filesize

      153B

      MD5

      a78c5213dcbc62242a2345778a622205

      SHA1

      c9ad35e46de6fd5eadb4349b734d5eb1f4850d3c

      SHA256

      69322dbb2f8af8e844bb28836184c58aa57d2909af2d9e074981b804b62133f0

      SHA512

      3d4181142573b694e1bb26c421f24eabee166dc609abd032d407c802674a56d1248d3afd0ed436dc4a651177c5e15a10a4afccbacd10809ddbeb7d8f39dbc142

    • C:\Users\Default\RuntimeBroker.exe

      Filesize

      749KB

      MD5

      a6479dae68115fad0a37c5fb33becf99

      SHA1

      398663b27c9297a884c800aa64916c976638a036

      SHA256

      441e25c74a8c10b804e0c7f2ffa803b1055c8cddec79e7d70270efb4857e18eb

      SHA512

      aa3dc1b98aa53708a2b9834fb3dc0585ae5deffa168fe65d2aff3d80f4b0849c41d3cbd37e306ac6bfbfe5689e8c625828c93453fd21d5f7ecc0b16ad85f7452

    • memory/1636-31-0x00007FFFC8800000-0x00007FFFC8819000-memory.dmp

      Filesize

      100KB

    • memory/1636-12-0x000001E9FFC00000-0x000001E9FFC18000-memory.dmp

      Filesize

      96KB

    • memory/1636-0-0x000001E9FDF00000-0x000001E9FDFC2000-memory.dmp

      Filesize

      776KB

    • memory/1636-6-0x000001E9FFBA0000-0x000001E9FFBAE000-memory.dmp

      Filesize

      56KB

    • memory/1636-8-0x000001E9FFBD0000-0x000001E9FFBEC000-memory.dmp

      Filesize

      112KB

    • memory/1636-9-0x00007FFFD66C0000-0x00007FFFD66C1000-memory.dmp

      Filesize

      4KB

    • memory/1636-10-0x000001E9FFC50000-0x000001E9FFCA0000-memory.dmp

      Filesize

      320KB

    • memory/1636-30-0x00007FFFD8050000-0x00007FFFD8245000-memory.dmp

      Filesize

      2.0MB

    • memory/1636-13-0x00007FFFD66B0000-0x00007FFFD66B1000-memory.dmp

      Filesize

      4KB

    • memory/1636-32-0x000001E9987A0000-0x000001E998849000-memory.dmp

      Filesize

      676KB

    • memory/1636-4-0x00007FFFD66D0000-0x00007FFFD66D1000-memory.dmp

      Filesize

      4KB

    • memory/1636-3-0x000001E998870000-0x000001E998880000-memory.dmp

      Filesize

      64KB

    • memory/1636-2-0x00007FFFBA0C0000-0x00007FFFBAB81000-memory.dmp

      Filesize

      10.8MB

    • memory/1636-1-0x000001E9986C0000-0x000001E99877E000-memory.dmp

      Filesize

      760KB

    • memory/1636-34-0x00007FFFBA0C0000-0x00007FFFBAB81000-memory.dmp

      Filesize

      10.8MB

    • memory/4748-49-0x00007FFFD8050000-0x00007FFFD8245000-memory.dmp

      Filesize

      2.0MB

    • memory/4748-39-0x000001DFB89F0000-0x000001DFB8A00000-memory.dmp

      Filesize

      64KB

    • memory/4748-43-0x00007FFFD8050000-0x00007FFFD8245000-memory.dmp

      Filesize

      2.0MB

    • memory/4748-44-0x00007FFFC8800000-0x00007FFFC8819000-memory.dmp

      Filesize

      100KB

    • memory/4748-45-0x000001DFB8F10000-0x000001DFB8FB9000-memory.dmp

      Filesize

      676KB

    • memory/4748-46-0x00007FFFB9A40000-0x00007FFFBA501000-memory.dmp

      Filesize

      10.8MB

    • memory/4748-47-0x000001DFB89F0000-0x000001DFB8A00000-memory.dmp

      Filesize

      64KB

    • memory/4748-38-0x00007FFFB9A40000-0x00007FFFBA501000-memory.dmp

      Filesize

      10.8MB