Analysis

  • max time kernel
    149s
  • max time network
    106s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240426-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-05-2024 05:46

General

  • Target

    f0d644b8a92fa2221a747d1a3ee7b985eaaaf62b0608dc40574b04f915037a5e.exe

  • Size

    70KB

  • MD5

    3f8b4ca2184d78d0e9263059951a4a52

  • SHA1

    90b9e4e5a7db01f5e44f1ad40d99b80273d70756

  • SHA256

    f0d644b8a92fa2221a747d1a3ee7b985eaaaf62b0608dc40574b04f915037a5e

  • SHA512

    f5495f42034a782768d65f5cd3c1bfd92ec64f17ea84f83d7cef7bcdd36ce9e79d5d16714850766f4bd5e2c9b967980dd304cee55021bcad00239718e62b75ed

  • SSDEEP

    1536:/J+mm2GeAvBGHg/y2sRyZ15zrpEgf7pm79bpc3cZlLhxf:/hIGHg/3sRyv5Jx7Y79bkcZlLhx

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 31 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • Views/modifies file attributes 1 TTPs 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0d644b8a92fa2221a747d1a3ee7b985eaaaf62b0608dc40574b04f915037a5e.exe
    "C:\Users\Admin\AppData\Local\Temp\f0d644b8a92fa2221a747d1a3ee7b985eaaaf62b0608dc40574b04f915037a5e.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Users\Admin\AppData\Roaming\Payload.exe
      "C:\Users\Admin\AppData\Roaming\Payload.exe"
      2⤵
      • Drops startup file
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3724
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe"
        3⤵
        • Views/modifies file attributes
        PID:960
      • C:\Windows\SysWOW64\attrib.exe
        attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.exe"
        3⤵
        • Views/modifies file attributes
        PID:3544
    • C:\Windows\SysWOW64\attrib.exe
      attrib +h +r +s "C:\Users\Admin\AppData\Roaming\Payload.exe"
      2⤵
      • Views/modifies file attributes
      PID:4520

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk

    Filesize

    1KB

    MD5

    18e2a33aa357f0fce52911ce470a5d23

    SHA1

    fb4b2f852861546e60c1bb3f25037917a0da9447

    SHA256

    4cc9945178a8818f5d859f7dd6a7006caa659a56b14c451161cc08d6ed11824c

    SHA512

    97675ddc0507edca93e3a0396bd40e94306a6fb14e39dab6437eb39ccff7a14de6e9132660f7f6d635dac0d30b522155048cea01b4a235b4176ab9694d169666

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\Windows.lnk

    Filesize

    1KB

    MD5

    8e1c839ee7cc43ee4e0aac542162aede

    SHA1

    aa9251c760659c1bac03f8754750f90db90bb076

    SHA256

    1088d3a9aad40cbb813b0c07ffb6465f9fb9c75efe9eae3118a5faa04482a44a

    SHA512

    70fe76285d8f18087f3264ab8feeae15449385ae67291a501dc85f5956d6732a3fb9e028279113a6dfa921d5fedacc0c69d26f216bff733cc25b5ca9301db082

  • C:\Users\Admin\AppData\Roaming\Payload.exe

    Filesize

    70KB

    MD5

    3f8b4ca2184d78d0e9263059951a4a52

    SHA1

    90b9e4e5a7db01f5e44f1ad40d99b80273d70756

    SHA256

    f0d644b8a92fa2221a747d1a3ee7b985eaaaf62b0608dc40574b04f915037a5e

    SHA512

    f5495f42034a782768d65f5cd3c1bfd92ec64f17ea84f83d7cef7bcdd36ce9e79d5d16714850766f4bd5e2c9b967980dd304cee55021bcad00239718e62b75ed

  • memory/2712-0-0x0000000074E42000-0x0000000074E43000-memory.dmp

    Filesize

    4KB

  • memory/2712-1-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/2712-2-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/2712-14-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3724-15-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3724-16-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3724-21-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3724-22-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB

  • memory/3724-23-0x0000000074E40000-0x00000000753F1000-memory.dmp

    Filesize

    5.7MB