Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 01:59
Static task
static1
Behavioral task
behavioral1
Sample
acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe
Resource
win10v2004-20240508-en
General
-
Target
acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe
-
Size
570KB
-
MD5
d6ead5d81986e9e21984c4ee8df32183
-
SHA1
7eb429ce51bf900f0ef4aa589cf8a789b6a4792a
-
SHA256
acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474
-
SHA512
13aba25679b8e3fe1b96ba94262d6afaa57f8554f7dc31e4643a417545ef292537e7e09cc5ec4c5c0c418b3057009eabfee00c5cf89d0a0354be2a7ff484f0be
-
SSDEEP
12288:LQM9bROJmafSPZDz7qElw2KxPo0q7qzC9b/uEvtHKYTsviIR8Cufe9ZqQwExr//M:Ld9Mrf7iaNVxowsTNkw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe -
Executes dropped EXE 2 IoCs
pid Process 4676 csrss.exe 2128 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive powershell.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log powershell.exe -
Drops file in Windows directory 15 IoCs
description ioc Process File opened for modification C:\Windows\Fonts\systcm32\n.bat acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe File created C:\Windows\Fonts\systcm32\svchost.exe acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe File opened for modification C:\Windows\Fonts\systcm32\svchost.exe acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe File opened for modification C:\Windows\Fonts\systcm32\d.bat acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe File created C:\Windows\Fonts\systcm32\1.ini cmd.exe File opened for modification C:\Windows\Fonts\systcm32\narrator.bat acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe File created C:\Windows\Fonts\systcm32\n.bat acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe File created C:\Windows\Fonts\systcm32\narrator.bat acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe File created C:\Windows\Fonts\systcm32\p.ps1 acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe File created C:\Windows\Fonts\systcm32\csrss.exe acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe File opened for modification C:\Windows\Fonts\systcm32\c.bat acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe File created C:\Windows\Fonts\systcm32\d.bat acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe File opened for modification C:\Windows\Fonts\systcm32\p.ps1 acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe File opened for modification C:\Windows\Fonts\systcm32\csrss.exe acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe File created C:\Windows\Fonts\systcm32\c.bat acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4372 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 46 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "0" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust powershell.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates powershell.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs powershell.exe -
Runs ping.exe 1 TTPs 5 IoCs
pid Process 3168 PING.EXE 5084 PING.EXE 1852 PING.EXE 3840 PING.EXE 4408 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2352 powershell.exe 2352 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3696 acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe Token: SeDebugPrivilege 2352 powershell.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 3696 wrote to memory of 4616 3696 acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe 83 PID 3696 wrote to memory of 4616 3696 acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe 83 PID 3696 wrote to memory of 4616 3696 acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe 83 PID 3696 wrote to memory of 688 3696 acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe 85 PID 3696 wrote to memory of 688 3696 acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe 85 PID 3696 wrote to memory of 688 3696 acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe 85 PID 4616 wrote to memory of 5084 4616 cmd.exe 87 PID 4616 wrote to memory of 5084 4616 cmd.exe 87 PID 4616 wrote to memory of 5084 4616 cmd.exe 87 PID 688 wrote to memory of 1852 688 cmd.exe 88 PID 688 wrote to memory of 1852 688 cmd.exe 88 PID 688 wrote to memory of 1852 688 cmd.exe 88 PID 4616 wrote to memory of 4676 4616 cmd.exe 92 PID 4616 wrote to memory of 4676 4616 cmd.exe 92 PID 4616 wrote to memory of 4676 4616 cmd.exe 92 PID 4616 wrote to memory of 3840 4616 cmd.exe 93 PID 4616 wrote to memory of 3840 4616 cmd.exe 93 PID 4616 wrote to memory of 3840 4616 cmd.exe 93 PID 4616 wrote to memory of 2176 4616 cmd.exe 94 PID 4616 wrote to memory of 2176 4616 cmd.exe 94 PID 4616 wrote to memory of 2176 4616 cmd.exe 94 PID 4616 wrote to memory of 2724 4616 cmd.exe 95 PID 4616 wrote to memory of 2724 4616 cmd.exe 95 PID 4616 wrote to memory of 2724 4616 cmd.exe 95 PID 4616 wrote to memory of 2296 4616 cmd.exe 96 PID 4616 wrote to memory of 2296 4616 cmd.exe 96 PID 4616 wrote to memory of 2296 4616 cmd.exe 96 PID 4616 wrote to memory of 5032 4616 cmd.exe 97 PID 4616 wrote to memory of 5032 4616 cmd.exe 97 PID 4616 wrote to memory of 5032 4616 cmd.exe 97 PID 4616 wrote to memory of 824 4616 cmd.exe 98 PID 4616 wrote to memory of 824 4616 cmd.exe 98 PID 4616 wrote to memory of 824 4616 cmd.exe 98 PID 4616 wrote to memory of 4408 4616 cmd.exe 99 PID 4616 wrote to memory of 4408 4616 cmd.exe 99 PID 4616 wrote to memory of 4408 4616 cmd.exe 99 PID 4616 wrote to memory of 4372 4616 cmd.exe 100 PID 4616 wrote to memory of 4372 4616 cmd.exe 100 PID 4616 wrote to memory of 4372 4616 cmd.exe 100 PID 2128 wrote to memory of 2352 2128 svchost.exe 102 PID 2128 wrote to memory of 2352 2128 svchost.exe 102 PID 2128 wrote to memory of 2352 2128 svchost.exe 102 PID 4616 wrote to memory of 3168 4616 cmd.exe 104 PID 4616 wrote to memory of 3168 4616 cmd.exe 104 PID 4616 wrote to memory of 3168 4616 cmd.exe 104 PID 4616 wrote to memory of 2036 4616 cmd.exe 105 PID 4616 wrote to memory of 2036 4616 cmd.exe 105 PID 4616 wrote to memory of 2036 4616 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe"C:\Users\Admin\AppData\Local\Temp\acad5da56a5e89b288e11f39789d7583c07972bc5253bcdcea96cb020b703474.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\Fonts\systcm32\d.bat" "2⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:5084
-
-
C:\Windows\Fonts\systcm32\csrss.exeC:\Windows\Fonts\systcm32\csrss.exe SysMaln C:\Windows\Fonts\systcm32\svchost.exe3⤵
- Executes dropped EXE
PID:4676
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3840
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysMaln /v Description /d "Maintains and improves system performance over time" /t reg_sz /f3⤵PID:2176
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysMaln /v DisplayName /d "SysMaln" /t reg_sz /f3⤵PID:2724
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysMaln\Parameters3⤵PID:2296
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysMaln\Parameters /v AppDirectory /d "C:\Windows\Fonts\systcm32" /t reg_sz /f3⤵PID:5032
-
-
C:\Windows\SysWOW64\reg.exereg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SysMaln\Parameters /v Application /d ""C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "C:\Windows\Fonts\systcm32\p.ps1"" /t reg_sz /f3⤵PID:824
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4408
-
-
C:\Windows\SysWOW64\sc.exesc start SysMaln3⤵
- Launches sc.exe
PID:4372
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3168
-
-
C:\Windows\SysWOW64\regini.exeregini 1.ini3⤵PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\HZ~417D.tmp.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:1852
-
-
-
C:\Windows\Fonts\systcm32\svchost.exeC:\Windows\Fonts\systcm32\svchost.exe1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\Fonts\systcm32\p.ps12⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD5aa21c5166af45b80ca8bc433e4d7f1db
SHA144b569eacd5552ab55182ae8282e3e3c6f59bb5e
SHA25690660487e15dc870ba6b6c16d6d68ae986e25635ef787a9f487ec104f3d74490
SHA512dda2ae53d2896636ea286d5228cad12fbf5375f44c1696060bc9336191968ca741c1723df2f1222a3bd9e74880a82b3d70a09edd29ebd0cbd8270ba17cccc18e
-
Filesize
68B
MD5c6c1441a5fb7e09711fb910bae0e082e
SHA17244e7c14447651b5dfdd694b5b9e0c7f202a6bb
SHA2566b012598ae7d5e1704001d0cbf3d88605a38cb440f600fee58f685ab8de6803d
SHA51231ab5c57a093c6b03f1be76bd2cae21653c637d5920820a20624442ad2bdd7bfc4e2edd25189cb58ba09a6b2d1327ab310769f3d8dc9c1d9dde063927298c982
-
Filesize
18KB
MD5c43d1b84143fb2561f22e1a2c8facf53
SHA13f1357007f61f02f97f0aaabb8756c6eca2acebd
SHA256bbf4c224f9861b2c1f5a1364ee71e38728495b2709621763053b979ba88522f1
SHA51227a25ab6045498e0b7131be58556c685dfa01596675c3af689e61d8329e1a0eff4128c57e202c32c69271b84f57e7425c45fb5fa132ec0f5b352f86323ffa13e
-
Filesize
1003B
MD5851672083b8326ed52b5461e167219a9
SHA15d9c5b58b831744520d5d8043e75b60487bbacaa
SHA256253efae79c531ac86bb260bf22db225ab1803df20018217ad4eadd3bf68d6883
SHA5120976f2f084b3bf2d96cf6de774136077c3b59dbc29b38a292382e6ef715ecfe3225c3ecb16c6e0c907400c28a8f82996b05b49e384dad06dff524536a4cbf45c
-
Filesize
17KB
MD5d300b7fea85fd5d113533d4503a35e66
SHA117d26fc4159841f727c9e8f4de46f67ff46fdda1
SHA25613aba0939793c189c2f40dd30a4da5d0b36b18c4545edd735a6d9e3d275b8d41
SHA512995e473c9e7f2d5fe540902a627fb5da6176019697604d8c1458b685b7d080502e3575605e93d8a8dcf0ec26683bb8b31421a53f38aa3438962fd1edb20453a2
-
Filesize
8KB
MD54635935fc972c582632bf45c26bfcb0e
SHA17c5329229042535fe56e74f1f246c6da8cea3be8
SHA256abd4afd71b3c2bd3f741bbe3cec52c4fa63ac78d353101d2e7dc4de2725d1ca1
SHA512167503133b5a0ebd9f8b2971bca120e902497eb21542d6a1f94e52ae8e5b6bde1e4cae1a2c905870a00d772e0df35f808701e2cfbd26dcbb130a5573fa590060
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82