Analysis

  • max time kernel
    143s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/05/2024, 14:46

General

  • Target

    ef162e0b023ea1d5131d11d5a33064e3fd0b1ae9698dc23d53bd9210afdda240.exe

  • Size

    165KB

  • MD5

    500237da069f05dcedb7fa187c613d98

  • SHA1

    196abe18b19a4b2e0c9728c4e535f94a99c1de81

  • SHA256

    ef162e0b023ea1d5131d11d5a33064e3fd0b1ae9698dc23d53bd9210afdda240

  • SHA512

    5350a4f2900c18d66a8a3c94d0dd7c705671eb78c62f64a68b23fb0b7dab2c8d03f43be2bdaa5074ecee64dc3535579897004f52b3b3960911d8a9872b217aa0

  • SSDEEP

    3072:3r1cWI8i05JurTwXU/ulPgc9qz+9+++++q+zq7:b1RJxur8XMQPgyh+++++q+zq7

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef162e0b023ea1d5131d11d5a33064e3fd0b1ae9698dc23d53bd9210afdda240.exe
    "C:\Users\Admin\AppData\Local\Temp\ef162e0b023ea1d5131d11d5a33064e3fd0b1ae9698dc23d53bd9210afdda240.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Users\Admin\AppData\Local\Temp\ef162e0b023ea1d5131d11d5a33064e3fd0b1ae9698dc23d53bd9210afdda240.exe
      "C:\Users\Admin\AppData\Local\Temp\ef162e0b023ea1d5131d11d5a33064e3fd0b1ae9698dc23d53bd9210afdda240.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:1984
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bbmlwlvyml.bat" "
        3⤵
          PID:2548
        • C:\Windows\M-50502979739026720652860250\winmgr.exe
          C:\Windows\M-50502979739026720652860250\winmgr.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:3760
          • C:\Windows\M-50502979739026720652860250\winmgr.exe
            C:\Windows\M-50502979739026720652860250\winmgr.exe
            4⤵
            • Executes dropped EXE
            • Drops file in Program Files directory
            PID:3480

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\bbmlwlvyml.bat

            Filesize

            302B

            MD5

            d36f8a757ede16ec733a4c9f38d3ece2

            SHA1

            539dc19158f27682422d95b655c313d7c46efe8c

            SHA256

            b00f0b8b1fbc007e8638067452261da4b6318700a22cd75313f9506d07b6b16f

            SHA512

            e1848402d072953814425581e6d606f2972c9245a89c0b0f95ea38d2303420de3ad252943fd5493115fad1d745776970a09662d255fa5c58f8b8d171a6a615f1

          • C:\Users\Admin\AppData\Local\Temp\phqghumeay

            Filesize

            166KB

            MD5

            f818647026b0a2b3158436921f4d2be2

            SHA1

            210bebaf97166f4560ae7b5722e447fc2db91516

            SHA256

            b2fa4189c9d8720c6e397e52a8d62f7c31b9a3829d5748803f7547e3973cdfe8

            SHA512

            2d4c352433283ddd9830fac717d8f6c2f585c82ffe755cfbea80a9c6dba5096bc79c542e967a8d0f634598c3be3b648ad90460c786255b704cae95d8ab059c1d

          • C:\Windows\M-50502979739026720652860250\winmgr.exe

            Filesize

            165KB

            MD5

            500237da069f05dcedb7fa187c613d98

            SHA1

            196abe18b19a4b2e0c9728c4e535f94a99c1de81

            SHA256

            ef162e0b023ea1d5131d11d5a33064e3fd0b1ae9698dc23d53bd9210afdda240

            SHA512

            5350a4f2900c18d66a8a3c94d0dd7c705671eb78c62f64a68b23fb0b7dab2c8d03f43be2bdaa5074ecee64dc3535579897004f52b3b3960911d8a9872b217aa0

          • memory/1840-0-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/1840-2-0x00000000005C0000-0x00000000006C0000-memory.dmp

            Filesize

            1024KB

          • memory/1840-4-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/1984-3-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/1984-6-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/1984-7-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/3480-25-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/3480-26-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/3480-28-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/3480-38-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/3480-39-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/3480-45-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/3480-46-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/3480-55-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/3480-62-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/3480-63-0x0000000000400000-0x000000000040C000-memory.dmp

            Filesize

            48KB

          • memory/3760-24-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB

          • memory/3760-18-0x0000000000400000-0x000000000042C000-memory.dmp

            Filesize

            176KB