Analysis

  • max time kernel
    138s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-05-2024 06:44

General

  • Target

    cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe

  • Size

    6.9MB

  • MD5

    120d23a3e154eb643eff9ca4617941d7

  • SHA1

    f3f6b7a0510b146b16521fa2ea4ddaf81302c136

  • SHA256

    cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441

  • SHA512

    0b80dc7effa92d0af6dd79f9ce577d5d458c7cbfa7fcd2990f5c746f64795d070625e9c335726e6f08b8e3a0e0601e7a82d9db5e4476c5e4b34f6a632795e9d9

  • SSDEEP

    196608:2xLe/IYmnsr9IYgcKFWAUv/bG98CyImPmiHu:oq/dmfY2rUE8CS

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe
    "C:\Users\Admin\AppData\Local\Temp\cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:5068
    • C:\Users\Admin\AppData\Local\Temp\cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe
      "C:\Users\Admin\AppData\Local\Temp\cd5a52176f5c81de1b971e02ad0744375125d41ee626d40804a235588d099441.exe" 1653532
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:5052
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5052 -s 692
        3⤵
        • Program crash
        PID:4752
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 5068 -s 1448
      2⤵
      • Program crash
      PID:3800
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 5068 -ip 5068
    1⤵
      PID:860
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5052 -ip 5052
      1⤵
        PID:2140

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/5052-15-0x0000000000400000-0x000000000140C000-memory.dmp

        Filesize

        16.0MB

      • memory/5052-30-0x0000000000400000-0x000000000140C000-memory.dmp

        Filesize

        16.0MB

      • memory/5052-29-0x0000000000400000-0x000000000140C000-memory.dmp

        Filesize

        16.0MB

      • memory/5052-24-0x0000000000400000-0x000000000140C000-memory.dmp

        Filesize

        16.0MB

      • memory/5052-16-0x0000000001460000-0x0000000001461000-memory.dmp

        Filesize

        4KB

      • memory/5052-17-0x0000000001480000-0x0000000001481000-memory.dmp

        Filesize

        4KB

      • memory/5052-18-0x0000000003070000-0x0000000003071000-memory.dmp

        Filesize

        4KB

      • memory/5052-19-0x0000000003080000-0x0000000003081000-memory.dmp

        Filesize

        4KB

      • memory/5052-20-0x0000000003090000-0x0000000003091000-memory.dmp

        Filesize

        4KB

      • memory/5052-21-0x00000000031B0000-0x00000000031B1000-memory.dmp

        Filesize

        4KB

      • memory/5052-22-0x00000000031C0000-0x00000000031C1000-memory.dmp

        Filesize

        4KB

      • memory/5068-3-0x00000000015D0000-0x00000000015D1000-memory.dmp

        Filesize

        4KB

      • memory/5068-13-0x0000000000ABB000-0x0000000000D31000-memory.dmp

        Filesize

        2.5MB

      • memory/5068-14-0x0000000000400000-0x000000000140C000-memory.dmp

        Filesize

        16.0MB

      • memory/5068-12-0x0000000000400000-0x000000000140C000-memory.dmp

        Filesize

        16.0MB

      • memory/5068-8-0x0000000000400000-0x000000000140C000-memory.dmp

        Filesize

        16.0MB

      • memory/5068-1-0x0000000001580000-0x0000000001581000-memory.dmp

        Filesize

        4KB

      • memory/5068-2-0x00000000015A0000-0x00000000015A1000-memory.dmp

        Filesize

        4KB

      • memory/5068-0-0x0000000000ABB000-0x0000000000D31000-memory.dmp

        Filesize

        2.5MB

      • memory/5068-4-0x00000000015E0000-0x00000000015E1000-memory.dmp

        Filesize

        4KB

      • memory/5068-5-0x0000000003190000-0x0000000003191000-memory.dmp

        Filesize

        4KB

      • memory/5068-6-0x00000000031A0000-0x00000000031A1000-memory.dmp

        Filesize

        4KB

      • memory/5068-7-0x00000000031B0000-0x00000000031B1000-memory.dmp

        Filesize

        4KB

      • memory/5068-10-0x0000000000400000-0x000000000140C000-memory.dmp

        Filesize

        16.0MB