Analysis

  • max time kernel
    149s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-05-2024 21:43

General

  • Target

    463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe

  • Size

    179KB

  • MD5

    44c14ebd1dd51d4f7de8e9badb6b6da9

  • SHA1

    1edb8eb6776c140b50a751624afc028f9d45692e

  • SHA256

    463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91

  • SHA512

    a6e1b5d638d2beaaa0bddfbc117de1b93263f9249b9cffd4edb4e91b079d6d6f3a3d1625a6deff655684ec89a531e9dc64349a018e8330e4b2a65125d258406d

  • SSDEEP

    3072:0XTTASJKf2n5AxE2NpxOa2XdU2QF4s5XgIDFyHb8kHofL/09rGB:0vASJKenie2xT2NU2OTFQb8Fb0IB

Score
9/10

Malware Config

Signatures

  • Detects executables packed with aPLib. 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe
    "C:\Users\Admin\AppData\Local\Temp\463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Windows\SysWOW64\svchost.exe
      C:\ProgramData\b6248002jj.exe
      2⤵
      • Adds Run key to start application
      • Checks for any installed AV software in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4452
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\vucE638.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe""
      2⤵
        PID:1128

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\vucE638.tmp.bat

      Filesize

      28B

      MD5

      0d2ab670219d6691d9c3a430abe69fd3

      SHA1

      744e06dfcfab05bec1255a2485188c079b69b67b

      SHA256

      73bb3981e45263a51c8af91df81ee5b52d2f2777b0bb6e489bcab1a105bd0abe

      SHA512

      aeebbb9ad747a0dd0857a0edd754294a36c6082cbbd8e04920ccc2d36ed2a70c952bd4101500626ae5459faad37098186aee0ca2db83feb841c7a5e7fccafa0f

    • memory/2528-0-0x0000000000D90000-0x0000000000DC0000-memory.dmp

      Filesize

      192KB

    • memory/2528-361-0x0000000000D90000-0x0000000000DC0000-memory.dmp

      Filesize

      192KB

    • memory/2528-360-0x0000000003880000-0x00000000038F6000-memory.dmp

      Filesize

      472KB

    • memory/4452-283-0x0000000001200000-0x0000000001276000-memory.dmp

      Filesize

      472KB

    • memory/4452-285-0x0000000001000000-0x0000000001200000-memory.dmp

      Filesize

      2.0MB

    • memory/4452-287-0x0000000001200000-0x0000000001276000-memory.dmp

      Filesize

      472KB

    • memory/4452-290-0x0000000001200000-0x0000000001276000-memory.dmp

      Filesize

      472KB

    • memory/4452-305-0x0000000001200000-0x0000000001276000-memory.dmp

      Filesize

      472KB

    • memory/4452-308-0x0000000001200000-0x0000000001276000-memory.dmp

      Filesize

      472KB

    • memory/4452-286-0x0000000001200000-0x0000000001276000-memory.dmp

      Filesize

      472KB

    • memory/4452-281-0x0000000001200000-0x0000000001276000-memory.dmp

      Filesize

      472KB

    • memory/4452-3-0x0000000001200000-0x0000000001276000-memory.dmp

      Filesize

      472KB

    • memory/4452-2-0x00000000009F0000-0x00000000009F1000-memory.dmp

      Filesize

      4KB

    • memory/4452-365-0x0000000001200000-0x0000000001276000-memory.dmp

      Filesize

      472KB

    • memory/4452-383-0x0000000001000000-0x0000000001200000-memory.dmp

      Filesize

      2.0MB