Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-05-2024 02:46

General

  • Target

    aea427c70191d19f294d3cbb9f86bd853b7d6bfa17616cee0147e5b79f9ff764.exe

  • Size

    12KB

  • MD5

    a6c72fa59cc5bab41b7ae6d0b4b5c1be

  • SHA1

    796a496a1b1b4d1be2b3f6a4b1050760eac62036

  • SHA256

    aea427c70191d19f294d3cbb9f86bd853b7d6bfa17616cee0147e5b79f9ff764

  • SHA512

    836e33e23ed324641d4a7ff9739f43574f8108bbbda30759bf4489ff1da30dd70aba4a45f915d7e105beb42d7bfeba00da8a39b89ec8aacb6ee8467636637cda

  • SSDEEP

    384:fL7li/2zyq2DcEQvdQcJKLTp/NK9xaLYIj:TaMCQ9ckIj

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aea427c70191d19f294d3cbb9f86bd853b7d6bfa17616cee0147e5b79f9ff764.exe
    "C:\Users\Admin\AppData\Local\Temp\aea427c70191d19f294d3cbb9f86bd853b7d6bfa17616cee0147e5b79f9ff764.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3320
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\nuihzoce\nuihzoce.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3856
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5AC2.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc1DC92E64ABA64E35A954B477EF1C6B.TMP"
        3⤵
          PID:1716
      • C:\Users\Admin\AppData\Local\Temp\tmp58EE.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp58EE.tmp.exe" C:\Users\Admin\AppData\Local\Temp\aea427c70191d19f294d3cbb9f86bd853b7d6bfa17616cee0147e5b79f9ff764.exe
        2⤵
        • Deletes itself
        • Executes dropped EXE
        PID:868

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RE.resources

      Filesize

      2KB

      MD5

      71b7df11cb5d2142da017bd1c19f1910

      SHA1

      9f19afb7ddace40f88abdd6caba3c962cd55ace0

      SHA256

      533a7a2285c070e7f0d6b6231fa828140ef0659205ec287dd8300eb3cfcc06f7

      SHA512

      cde7bdc76393b8a0a0579268a661ea465f1f9e748a5535dbaa11d52fccc798c30e346021f26878b6102d56d0f4f4034c3ae2ff490b3df9bf70b7dd9c2e4658a2

    • C:\Users\Admin\AppData\Local\Temp\RES5AC2.tmp

      Filesize

      1KB

      MD5

      9f21ed57923d4f1fdab58571b7e1b8ef

      SHA1

      0aff55f723c762fe178346db6f7645bc44cf663f

      SHA256

      ebdf50cd80a9b6b31eebf0efa955fad423a0a2684501143e60058a7dfde92886

      SHA512

      27189a1c302edfa507e7a061594051c2b066a90b24ca1b16c6044f270c736e5d5837b3ad6bc4b2ff017099df63b66622a79c92e45c78a74498adcc8e993f23ff

    • C:\Users\Admin\AppData\Local\Temp\nuihzoce\nuihzoce.0.vb

      Filesize

      2KB

      MD5

      dc33e80a3a777c6747787ae44bf67456

      SHA1

      921489cfe33408b6ea09284765f9c161eb321541

      SHA256

      93a9d5527b695a7a3b13c5fac9a17beddce08907f41b3c5cb9d0517351c5658b

      SHA512

      1bdd72c5f229df503239b67ca61a393eabaf674eeb5601fb5a7dc0e38c28cac47ae1f66b809f8fbec955b17ef684bec974919e2605b1258ed92e67ed79d8c101

    • C:\Users\Admin\AppData\Local\Temp\nuihzoce\nuihzoce.cmdline

      Filesize

      273B

      MD5

      a047d6799a1010b42b7edbf3dbb3b612

      SHA1

      9edb16a385b50fd23ef10c5f75235baff89cdecf

      SHA256

      36c4dbf87510e15a3328ddb2e6aac5c49a920dbb09f6844e442d84e70732e108

      SHA512

      6a8383bd45837d1adcd748f3f1bb7a941556ecfecfbd5606b53b6b32801f19998d8649c57ce4083e4c5a5eaf4aba071f29fc3a677725058c1ab7ec44ba033a47

    • C:\Users\Admin\AppData\Local\Temp\tmp58EE.tmp.exe

      Filesize

      12KB

      MD5

      fe0c9fbae32e4e84da64f4f87667bd37

      SHA1

      77ee4013c4c94809a2510d31f45fd3223afab916

      SHA256

      262a7d116dc126d7ad25a737930b59c727465b7bcdf00ec7013117f0820837b6

      SHA512

      998d3c738b638518632ca5dbb17bab0f4aeeea2497048fa996ffa6769c26479e9b4563697021d254b9ca620c93756f1a6e9eba980030ba32cc8ccfc3f4a4d49a

    • C:\Users\Admin\AppData\Local\Temp\vbc1DC92E64ABA64E35A954B477EF1C6B.TMP

      Filesize

      1KB

      MD5

      f96339fe087cb9669af295685c7d2624

      SHA1

      b80ede571eabace7b510450c1c709afb87017382

      SHA256

      e5eef5f4607f1da44d625b9bf3b61c653415ba1d4ac61133793ef21ed4550a6f

      SHA512

      0e89a3cf0b334f3baaf41f687894e8ffb4765b02f29cfba115009ce9b79092ce5ecba025b308f0c12b8777111bf23af6dc014e7eed3f0eeaa1cd9e3790d75d3a

    • memory/868-26-0x00000000003F0000-0x00000000003FA000-memory.dmp

      Filesize

      40KB

    • memory/868-25-0x0000000074A50000-0x0000000075200000-memory.dmp

      Filesize

      7.7MB

    • memory/868-27-0x0000000005390000-0x0000000005934000-memory.dmp

      Filesize

      5.6MB

    • memory/868-28-0x0000000004DE0000-0x0000000004E72000-memory.dmp

      Filesize

      584KB

    • memory/868-30-0x0000000074A50000-0x0000000075200000-memory.dmp

      Filesize

      7.7MB

    • memory/3320-0-0x0000000074A5E000-0x0000000074A5F000-memory.dmp

      Filesize

      4KB

    • memory/3320-8-0x0000000074A50000-0x0000000075200000-memory.dmp

      Filesize

      7.7MB

    • memory/3320-2-0x00000000054C0000-0x000000000555C000-memory.dmp

      Filesize

      624KB

    • memory/3320-1-0x0000000000A20000-0x0000000000A2A000-memory.dmp

      Filesize

      40KB

    • memory/3320-24-0x0000000074A50000-0x0000000075200000-memory.dmp

      Filesize

      7.7MB