Analysis

  • max time kernel
    146s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/06/2024, 18:39

General

  • Target

    0ca0ec9f55ed50e31c7b7f13a6fe152224915a0c4df5f8bb0f84314ec2799853.exe

  • Size

    1.0MB

  • MD5

    128c81bbb304a3161d1230d9ba0e42d9

  • SHA1

    92111ee4933325782937fa078f8fb9f11f4ad0af

  • SHA256

    0ca0ec9f55ed50e31c7b7f13a6fe152224915a0c4df5f8bb0f84314ec2799853

  • SHA512

    bf8f506a54a80a893ad9e23b2fe20ddd6d12c22486c12c7eea264e75c164276a26e715e966d12fcf9e1a8e57934bf2c68b8412c8d337fab9cea6b963ad09c558

  • SSDEEP

    12288:rVCk33HF6MVLsaQkNzwYkNWoaiiy4Ammme3zvGgQTyVhosftZkb2T6P3:rVCAkMVlNznPyYe3zvGtGLos03

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in Program Files directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0ca0ec9f55ed50e31c7b7f13a6fe152224915a0c4df5f8bb0f84314ec2799853.exe
    "C:\Users\Admin\AppData\Local\Temp\0ca0ec9f55ed50e31c7b7f13a6fe152224915a0c4df5f8bb0f84314ec2799853.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\0ca0ec9f55ed50e31c7b7f13a6fe152224915a0c4df5f8bb0f84314ec2799853.exe
      "C:\Users\Admin\AppData\Local\Temp\0ca0ec9f55ed50e31c7b7f13a6fe152224915a0c4df5f8bb0f84314ec2799853.exe" C:\Users\Admin\AppData\Local\Temp\0ca0ec9f55ed50e31c7b7f13a6fe152224915a0c4df5f8bb0f84314ec2799853.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1552
    • C:\Program Files (x86)\Adobe\acrotray.exe
      "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\0ca0ec9f55ed50e31c7b7f13a6fe152224915a0c4df5f8bb0f84314ec2799853.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Program Files (x86)\Adobe\acrotray.exe
        "C:\Program Files (x86)\Adobe\acrotray.exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\0ca0ec9f55ed50e31c7b7f13a6fe152224915a0c4df5f8bb0f84314ec2799853.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1924
      • C:\Program Files (x86)\Adobe\acrotray .exe
        "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\0ca0ec9f55ed50e31c7b7f13a6fe152224915a0c4df5f8bb0f84314ec2799853.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1564
        • C:\Program Files (x86)\Adobe\acrotray .exe
          "C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray .exe" C:\Program Files (x86)\Adobe\acrotray.exe" C:\Users\Admin\AppData\Local\Temp\0ca0ec9f55ed50e31c7b7f13a6fe152224915a0c4df5f8bb0f84314ec2799853.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3136
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:1000
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1292
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3076
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:17418 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:3968
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1292 CREDAT:17426 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:968

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\Adobe\acrotray .exe

            Filesize

            1.1MB

            MD5

            9595f8fa74be40556662d50ab10127e9

            SHA1

            62db7bfcf085681e486ca13e9775626035db77a7

            SHA256

            e3cf0efb8fe8e16b7215f335057e6f9bc997b41005c2b4ccec7eedc5376d0ae7

            SHA512

            4ebd3f878cf71ef0c59dad72938f69ae4b022490d97d0a3836cf6a6d15a9a6645b496030e48b8c48382706dfb3c858840bf6582436dc1ffb29f74903626c26fc

          • C:\Program Files (x86)\Adobe\acrotray.exe

            Filesize

            1.0MB

            MD5

            737fa45ad31c081ac29c34b95c917461

            SHA1

            36f7ebcde19572f730d33d2f739db70fe387b4c2

            SHA256

            091c2490f819d99d71e9648b8ed10fd549bbe9a9443a243cf4872f6d763d58d5

            SHA512

            39eb4b44e61d4c38e2a5f62591150a97a301508adec5d1331d46d6817ac260562c1bed5b908c594047c7126c765f0e06d3399aadc7fac92bde06f28e97bd67ff

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

            Filesize

            3KB

            MD5

            896c36321adb0c8d430eebe4237dd3cd

            SHA1

            425f7ed14ddf8264f2482b24b7ea357600c2f955

            SHA256

            ff5976643dded2ac215d644b3c5d68d239f9c0139abbb5c6fba8569a7d4394da

            SHA512

            98dc35f12b5fa28fccd2fbcda2e97b534ba01703ee67c41be71b9f243315bcd9adae02432740896654774a0936e76602649472fe0b39e2e84bb06551df7afa98

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\28c8b86deab549a1.customDestinations-ms

            Filesize

            3KB

            MD5

            9d2e869649c7109f1a601274875f4eb8

            SHA1

            06f88e9e3a6fc889254c047eea6927f81dd5c6bd

            SHA256

            b6e931a7ebe3cddad3e6ac265f36a33d3f702259033764e032e06d5a4b1eda98

            SHA512

            7aa39c96601f2514338408b95115200df6bb43413e799aac78012f79e8dd9cd97bc73bdc7a13fc6d98121f6e41cc9befe1c2c33fa91d769c1ebe81f1030653c9

          • memory/1204-0-0x0000000010000000-0x0000000010010000-memory.dmp

            Filesize

            64KB