Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/06/2024, 01:59

General

  • Target

    acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe

  • Size

    570KB

  • MD5

    d6ead5d81986e9e21984c4ee8df32183

  • SHA1

    7eb429ce51bf900f0ef4aa589cf8a789b6a4792a

  • SHA256

    acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474

  • SHA512

    13aba25679b8e3fe1b96ba94262d6afaa57f8554f7dc31e4643a417545ef292537e7e09cc5ec4c5c0c418b3057009eabfee00c5cf89d0a0354be2a7ff484f0be

  • SSDEEP

    12288:LQM9bROJmafSPZDz7qElw2KxPo0q7qzC9b/uEvtHKYTsviIR8Cufe9ZqQwExr//M:Ld9Mrf7iaNVxowsTNkw

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 15 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies data under HKEY_USERS 46 IoCs
  • Runs ping.exe 1 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe
    "C:\Users\Admin\AppData\Local\Temp\acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3696
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systcm32\d.bat" "
      2⤵
      • Drops file in Windows directory
      • Suspicious use of WriteProcessMemory
      PID:4616
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:5084
      • C:\Windows\Fonts\systcm32\csrss.exe
        C:\Windows\Fonts\systcm32\csrss.exe SysMaln C:\Windows\Fonts\systcm32\svchost.exe
        3⤵
        • Executes dropped EXE
        PID:4676
      • C:\Windows\SysWOW64\PING.EXE
        ping 127.0.0.1
        3⤵
        • Runs ping.exe
        PID:3840
      • C:\Windows\SysWOW64\reg.exe
        reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysMaln /v Description /d "Maintains and improves system performance over time" /t reg_sz /f
        3⤵
          PID:2176
        • C:\Windows\SysWOW64\reg.exe
          reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysMaln /v DisplayName /d "SysMaln" /t reg_sz /f
          3⤵
            PID:2724
          • C:\Windows\SysWOW64\reg.exe
            reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysMaln\Parameters
            3⤵
              PID:2296
            • C:\Windows\SysWOW64\reg.exe
              reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysMaln\Parameters /v AppDirectory /d "C:\Windows\Fonts\systcm32" /t reg_sz /f
              3⤵
                PID:5032
              • C:\Windows\SysWOW64\reg.exe
                reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysMaln\Parameters /v Application /d ""C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "C:\Windows\Fonts\systcm32\p.ps1"" /t reg_sz /f
                3⤵
                  PID:824
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1
                  3⤵
                  • Runs ping.exe
                  PID:4408
                • C:\Windows\SysWOW64\sc.exe
                  sc start SysMaln
                  3⤵
                  • Launches sc.exe
                  PID:4372
                • C:\Windows\SysWOW64\PING.EXE
                  ping 127.0.0.1
                  3⤵
                  • Runs ping.exe
                  PID:3168
                • C:\Windows\SysWOW64\regini.exe
                  regini 1.ini
                  3⤵
                    PID:2036
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\HZ~417D.tmp.bat"
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:688
                  • C:\Windows\SysWOW64\PING.EXE
                    ping 127.0.0.1 -n 2
                    3⤵
                    • Runs ping.exe
                    PID:1852
              • C:\Windows\Fonts\systcm32\svchost.exe
                C:\Windows\Fonts\systcm32\svchost.exe
                1⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:2128
                • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\Fonts\systcm32\p.ps1
                  2⤵
                  • Drops file in System32 directory
                  • Modifies data under HKEY_USERS
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2352

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\HZ~417D.tmp.bat

                Filesize

                266B

                MD5

                aa21c5166af45b80ca8bc433e4d7f1db

                SHA1

                44b569eacd5552ab55182ae8282e3e3c6f59bb5e

                SHA256

                90660487e15dc870ba6b6c16d6d68ae986e25635ef787a9f487ec104f3d74490

                SHA512

                dda2ae53d2896636ea286d5228cad12fbf5375f44c1696060bc9336191968ca741c1723df2f1222a3bd9e74880a82b3d70a09edd29ebd0cbd8270ba17cccc18e

              • C:\Windows\Fonts\systcm32\1.ini

                Filesize

                68B

                MD5

                c6c1441a5fb7e09711fb910bae0e082e

                SHA1

                7244e7c14447651b5dfdd694b5b9e0c7f202a6bb

                SHA256

                6b012598ae7d5e1704001d0cbf3d88605a38cb440f600fee58f685ab8de6803d

                SHA512

                31ab5c57a093c6b03f1be76bd2cae21653c637d5920820a20624442ad2bdd7bfc4e2edd25189cb58ba09a6b2d1327ab310769f3d8dc9c1d9dde063927298c982

              • C:\Windows\Fonts\systcm32\csrss.exe

                Filesize

                18KB

                MD5

                c43d1b84143fb2561f22e1a2c8facf53

                SHA1

                3f1357007f61f02f97f0aaabb8756c6eca2acebd

                SHA256

                bbf4c224f9861b2c1f5a1364ee71e38728495b2709621763053b979ba88522f1

                SHA512

                27a25ab6045498e0b7131be58556c685dfa01596675c3af689e61d8329e1a0eff4128c57e202c32c69271b84f57e7425c45fb5fa132ec0f5b352f86323ffa13e

              • C:\Windows\Fonts\systcm32\d.bat

                Filesize

                1003B

                MD5

                851672083b8326ed52b5461e167219a9

                SHA1

                5d9c5b58b831744520d5d8043e75b60487bbacaa

                SHA256

                253efae79c531ac86bb260bf22db225ab1803df20018217ad4eadd3bf68d6883

                SHA512

                0976f2f084b3bf2d96cf6de774136077c3b59dbc29b38a292382e6ef715ecfe3225c3ecb16c6e0c907400c28a8f82996b05b49e384dad06dff524536a4cbf45c

              • C:\Windows\Fonts\systcm32\p.ps1

                Filesize

                17KB

                MD5

                d300b7fea85fd5d113533d4503a35e66

                SHA1

                17d26fc4159841f727c9e8f4de46f67ff46fdda1

                SHA256

                13aba0939793c189c2f40dd30a4da5d0b36b18c4545edd735a6d9e3d275b8d41

                SHA512

                995e473c9e7f2d5fe540902a627fb5da6176019697604d8c1458b685b7d080502e3575605e93d8a8dcf0ec26683bb8b31421a53f38aa3438962fd1edb20453a2

              • C:\Windows\Fonts\systcm32\svchost.exe

                Filesize

                8KB

                MD5

                4635935fc972c582632bf45c26bfcb0e

                SHA1

                7c5329229042535fe56e74f1f246c6da8cea3be8

                SHA256

                abd4afd71b3c2bd3f741bbe3cec52c4fa63ac78d353101d2e7dc4de2725d1ca1

                SHA512

                167503133b5a0ebd9f8b2971bca120e902497eb21542d6a1f94e52ae8e5b6bde1e4cae1a2c905870a00d772e0df35f808701e2cfbd26dcbb130a5573fa590060

              • C:\Windows\Temp\__PSScriptPolicyTest_wwgy30uf.vpu.ps1

                Filesize

                60B

                MD5

                d17fe0a3f47be24a6453e9ef58c94641

                SHA1

                6ab83620379fc69f80c0242105ddffd7d98d5d9d

                SHA256

                96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                SHA512

                5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

              • memory/2352-28-0x0000000004130000-0x0000000004196000-memory.dmp

                Filesize

                408KB

              • memory/2352-27-0x00000000038E0000-0x0000000003902000-memory.dmp

                Filesize

                136KB

              • memory/2352-26-0x0000000003A00000-0x0000000004028000-memory.dmp

                Filesize

                6.2MB

              • memory/2352-34-0x00000000041A0000-0x0000000004206000-memory.dmp

                Filesize

                408KB

              • memory/2352-39-0x0000000004310000-0x0000000004664000-memory.dmp

                Filesize

                3.3MB

              • memory/2352-40-0x00000000047A0000-0x00000000047BE000-memory.dmp

                Filesize

                120KB

              • memory/2352-41-0x00000000047E0000-0x000000000482C000-memory.dmp

                Filesize

                304KB

              • memory/2352-25-0x0000000000ED0000-0x0000000000F06000-memory.dmp

                Filesize

                216KB

              • memory/4676-22-0x0000000000400000-0x000000000040A000-memory.dmp

                Filesize

                40KB