Resubmissions

24-06-2024 13:27

240624-qqbq2sthna 10

06-04-2024 12:50

240406-p2yvaabc36 10

Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    24-06-2024 13:27

General

  • Target

    6371b930d541e441cb5a9234b327395e05501f3405fb45ef13d9c2dabb6aa40c.exe

  • Size

    145KB

  • MD5

    c00352e2857075c8f757ea9be769b652

  • SHA1

    2a100aa5902ba6f9f35187117182afabf220071b

  • SHA256

    6371b930d541e441cb5a9234b327395e05501f3405fb45ef13d9c2dabb6aa40c

  • SHA512

    94d7e90ebd6b1d37daa43617a345c463d59096903a55621ff3eb490179411cb7bb58f75bb396a5d2b8720701833dc623ddfb259ad35c0716703a8e4bc66018ad

  • SSDEEP

    3072:m6glyuxE4GsUPnliByocWepbN3/1rtqd:m6gDBGpvEByocWeFN3/F8

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6371b930d541e441cb5a9234b327395e05501f3405fb45ef13d9c2dabb6aa40c.exe
    "C:\Users\Admin\AppData\Local\Temp\6371b930d541e441cb5a9234b327395e05501f3405fb45ef13d9c2dabb6aa40c.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\ProgramData\66F7.tmp
      "C:\ProgramData\66F7.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:1264
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\66F7.tmp >> NUL
        3⤵
          PID:2532

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-1337824034-2731376981-3755436523-1000\desktop.ini

      Filesize

      129B

      MD5

      ad48d34e57eb4c06dba439ee0f9ccff8

      SHA1

      a270146024d3289d460acf5431ed5683dfd1be35

      SHA256

      5fb1692fe589875cb8d094ae86c0707e4cabce3189d8c6f86b855d16faebc996

      SHA512

      956d3574003ee207650d03b66edcb602a5ed96c7b39fd2bd8ace3868011085c70ccf9372a80a53858fa244c68a08a53f606da76efd7a15fe7509eac3567bbad3

    • C:\2P7jdGpHD.README.txt

      Filesize

      354B

      MD5

      82477511bd66d813474e640b636bba76

      SHA1

      045c9f40e45f02e9154166a012e5a021ae5e3ca8

      SHA256

      bc381eb017ab84d17eb6f3ae994305ef1edd3898d5ec140b2dd5ba478c81e428

      SHA512

      12d62cece6f54188720ea3381b4695129e06aed7c7ff9f0170f349b47bfdb8eff93fa3d682bb2e995310586088cd5a27e28b14a2f85bedd9568d3451ab9966c4

    • C:\ProgramData\66F7.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDDD

      Filesize

      145KB

      MD5

      63097b02f48a20dc7f46e496a9b88715

      SHA1

      174e313c8274deca5c6cdae29bc8e0445180078e

      SHA256

      ef6ba6cfd6b2c05ce745574403fbdd22694c858b99400e71df61a6c6d41e3389

      SHA512

      db33760320eda7b6cc91966ed14d7d2c166e7f92798635fe14adb3876b0236f1001e052b2be832e03cae97bd2efd3c7387416b63213f7257556a977ed4f50352

    • F:\$RECYCLE.BIN\S-1-5-21-1337824034-2731376981-3755436523-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      fc2ef2b8b5fec2d45e3a05ff47cfdfd1

      SHA1

      1eb276369090676831bc87c4c6a0146e399a4ca7

      SHA256

      928c804c127af7de75de9196d7b784d383b0cbd5571cb505e91764be8f5b1a09

      SHA512

      58527738eb6674bb12ec9fb70a18dd6f17f961d8774aee95a761859cbc633d4952617d72b7f96c40449899a38affc5483e0458363bbb6d4d5aef57f3fec825f5

    • memory/1264-113-0x000000007FDC0000-0x000000007FDC1000-memory.dmp

      Filesize

      4KB

    • memory/1264-112-0x000000007FE20000-0x000000007FE21000-memory.dmp

      Filesize

      4KB

    • memory/1264-111-0x00000000024C0000-0x00000000024D0000-memory.dmp

      Filesize

      64KB

    • memory/1264-110-0x000000007FE40000-0x000000007FE41000-memory.dmp

      Filesize

      4KB

    • memory/1264-143-0x000000007FE00000-0x000000007FE01000-memory.dmp

      Filesize

      4KB

    • memory/1264-142-0x000000007FDE0000-0x000000007FDE1000-memory.dmp

      Filesize

      4KB

    • memory/3128-4-0x0000000003150000-0x0000000003160000-memory.dmp

      Filesize

      64KB

    • memory/3128-14-0x0000000003150000-0x0000000003160000-memory.dmp

      Filesize

      64KB

    • memory/3128-0-0x0000000003150000-0x0000000003160000-memory.dmp

      Filesize

      64KB