Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 02:59

General

  • Target

    d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe

  • Size

    715KB

  • MD5

    2683435f8356b41552418e5cc12d331d

  • SHA1

    87a2d1896275282d7f3e94215fc47b48d0799877

  • SHA256

    d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359

  • SHA512

    6470969180651b766b3e0b295a750f35d9d4a09674b51dd427d3dbf9e03f3eee9b66873915f24ac4edb78b62575d2e493d3fca454b78f0bfb2db1d2f65ca6f1b

  • SSDEEP

    12288:E6RZu520Z1CNRPZvgmY3Z3mTiUY7ZfxTvjorwDtVglN:EqK7Z8pvT2ZdUYTTjoBX

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in Program Files directory 7 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SetWindowsHookEx 12 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe
    "C:\Users\Admin\AppData\Local\Temp\d5f25209ed3d62912af4861406431e603015e6eb1665d05fcbab4b082fc94359.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Program Files directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2024
    • C:\program files (x86)\internet explorer\wmpscfgs.exe
      "C:\program files (x86)\internet explorer\wmpscfgs.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:720
    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3336
      • C:\program files (x86)\internet explorer\wmpscfgs.exe
        "C:\program files (x86)\internet explorer\wmpscfgs.exe" Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4660
      • C:\program files (x86)\internet explorer\wmpscfgs.exe
        "C:\program files (x86)\internet explorer\wmpscfgs.exe" Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4896
      • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2552
  • C:\Program Files (x86)\Internet Explorer\ielowutil.exe
    "C:\Program Files (x86)\Internet Explorer\ielowutil.exe" -CLSID:{0002DF01-0000-0000-C000-000000000046} -Embedding
    1⤵
      PID:4128
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
      1⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3560
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3560 CREDAT:17410 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4292
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3560 CREDAT:17418 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4940
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3560 CREDAT:17426 /prefetch:2
        2⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:4384

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files (x86)\Internet Explorer\wmpscfgs.exe

      Filesize

      732KB

      MD5

      908f1a757930deab82bb4f411c46d938

      SHA1

      82e65ef36227d18c7682414e954b73aa2afbd40e

      SHA256

      ce2fc401bdb1d0b657537f9db0dae2fb01a0a15e0a3f3fd80a7790c7e470c428

      SHA512

      133bf927efe1c95f0e59adfc2d0c8762635f95de7c11c625ee9a20327df54228f7ee1b0448cd6149046b9e7ec51f1aa58f3df6f6008c384ede8a8afd628e9fec

    • \??\c:\program files (x86)\common files\java\java update\jusched.exe

      Filesize

      744KB

      MD5

      9de2c64f80b8b59dc8ce281941fdc5df

      SHA1

      4498d57d913be265e97c03de06605546ba60adfa

      SHA256

      ddef3a3703353f57ccd5864b7e848bd6768330601619f0a122ce2e69ab45a205

      SHA512

      68c48c23ef04485930e3fd20e12701e627d7e15d999b9eeeabed954ec21618800bfb762d145569c4a1f388d0e6b012f5d1d944af8626444971d42bc8b20ae73e

    • memory/2024-0-0x0000000010000000-0x0000000010010000-memory.dmp

      Filesize

      64KB