Analysis

  • max time kernel
    51s
  • max time network
    51s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240508-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/06/2024, 04:04

General

  • Target

    ef4dd9f2231248d6ad3bb0e1ab282d76a427180ee6b0aa3251fe3e5ab11f0122.exe

  • Size

    12KB

  • MD5

    821fab1712d18c54b64dc561604f1e6b

  • SHA1

    76cc334083cb56cac6b5d9f10341d78a2db36750

  • SHA256

    ef4dd9f2231248d6ad3bb0e1ab282d76a427180ee6b0aa3251fe3e5ab11f0122

  • SHA512

    ceef6f1c3ff5e90339a06fbf6982399036dc781e0aeab9e2170e74ba7138cdc58763b2f472281bd982cdecd22c180afc3460339c96f9065534a33cee0aef2bfb

  • SSDEEP

    384:6L7li/2z5q2DcEQvdhcJKLTp/NK9xag2:k5M/Q9cg2

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ef4dd9f2231248d6ad3bb0e1ab282d76a427180ee6b0aa3251fe3e5ab11f0122.exe
    "C:\Users\Admin\AppData\Local\Temp\ef4dd9f2231248d6ad3bb0e1ab282d76a427180ee6b0aa3251fe3e5ab11f0122.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\mn2zfiri\mn2zfiri.cmdline"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES5776.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc6D63882ABD1B41249DCBE14159822E56.TMP"
        3⤵
          PID:5000
      • C:\Users\Admin\AppData\Local\Temp\tmp55B2.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp55B2.tmp.exe" C:\Users\Admin\AppData\Local\Temp\ef4dd9f2231248d6ad3bb0e1ab282d76a427180ee6b0aa3251fe3e5ab11f0122.exe
        2⤵
        • Deletes itself
        • Executes dropped EXE
        PID:4852

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\RE.resources

            Filesize

            2KB

            MD5

            c0640d1ae9d92b07a7f0b1f7a584fb42

            SHA1

            a42c2fcee58368e7364bf79f0014759185b13bf2

            SHA256

            0915f01032a42bb1559c18cc6427b3bf4e548497d176d42346d147df9f40a136

            SHA512

            5e3ddc49fb0b896c91624292956f6f803ba6239d8416bda69e5603dbbf4e78595db5394711c17da1bf5b7f2f3319a1c5d999f2103b28bbaaf6af9b0b28899b9a

          • C:\Users\Admin\AppData\Local\Temp\RES5776.tmp

            Filesize

            1KB

            MD5

            ba512032df1b3d99c2bff0681f3bbef1

            SHA1

            1bd02919ed6a4a547e900b4e52d1e340d7b1e800

            SHA256

            ab80a8a556cfe95af6d32f3436f88488d930218d2cda4776b44338bbb8a926e0

            SHA512

            626512ee5b74887ac57111f79d981afee2e068d8cdf5576d8a4c959fd44214f6f39b8e1d77070f1fd7c66e82befc00ce7c682d02627d1e53b3ae889051cb16b4

          • C:\Users\Admin\AppData\Local\Temp\mn2zfiri\mn2zfiri.0.vb

            Filesize

            2KB

            MD5

            8a42308190de0b08c7af589ec705103a

            SHA1

            9823f7d719ac3c1c739540e23a020b1f3b4636c4

            SHA256

            f7609016095da795c421009eea40ba10e014b8c9de1896715e1be1b68ba7e709

            SHA512

            d43e2bd1fd273dc2653d979bf9e145649d764101bbe4817879fe4dd51d6a9920c1f42ff1d76b11f54503cb730dd298ee8c9f57201d7fbf243bd757edc0020b4c

          • C:\Users\Admin\AppData\Local\Temp\mn2zfiri\mn2zfiri.cmdline

            Filesize

            273B

            MD5

            3f6b9713bf949b69e90ac2394918f090

            SHA1

            c89d85c90b7ef4c67079abec455be06c63f906d1

            SHA256

            11a22e085ab3587ccc9a768dd73a774728e92d3490fe391428c0ae53f18b4cbe

            SHA512

            b7ec4140ee53910d910b2529c635729162594d8980ee7ff4a44d85ce2ed140938055bbeb7f75097e6597c8d599eb56a6eff6094e9be67e23856672c6e1b0f91a

          • C:\Users\Admin\AppData\Local\Temp\tmp55B2.tmp.exe

            Filesize

            12KB

            MD5

            2eb3e6b56a84150d20e9e7212d679eb1

            SHA1

            2ff2ed39ee0eeb9d5f4436d7c312807e88ad35ef

            SHA256

            005641ff618ae971e8d5ac7443bd5e82a9b0ad6e4492d2d5a20da60717111f42

            SHA512

            2e95d376249a5c772b236c260d3a669d5cfc20b9790ec9c60908a7ad810d2b47e9f1a9d9a0e15610c761a682c3a262879200df8851639ebed30132e5538fefe8

          • C:\Users\Admin\AppData\Local\Temp\vbc6D63882ABD1B41249DCBE14159822E56.TMP

            Filesize

            1KB

            MD5

            223bc34b77dd67afb44bab8d1180e4ff

            SHA1

            5757815efcbdd2842d1e6a7f7a09111b738e39b8

            SHA256

            fc1297e55697213d5985931a965824b02c5c812e41cb2ead08d5508c5dca8d04

            SHA512

            a9c678f9ea82f2e74e71a254c087ff01555371e13d41bbe83a135bd30741aa03c8f3c236d4995b0908517339c284fa2efa2c7650a1d7f91163fefb27eb11256d

          • memory/1212-0-0x0000000074ACE000-0x0000000074ACF000-memory.dmp

            Filesize

            4KB

          • memory/1212-8-0x0000000074AC0000-0x0000000075270000-memory.dmp

            Filesize

            7.7MB

          • memory/1212-2-0x00000000059D0000-0x0000000005A6C000-memory.dmp

            Filesize

            624KB

          • memory/1212-1-0x0000000000FD0000-0x0000000000FDA000-memory.dmp

            Filesize

            40KB

          • memory/1212-24-0x0000000074AC0000-0x0000000075270000-memory.dmp

            Filesize

            7.7MB

          • memory/4852-26-0x0000000074AC0000-0x0000000075270000-memory.dmp

            Filesize

            7.7MB

          • memory/4852-25-0x0000000000620000-0x000000000062A000-memory.dmp

            Filesize

            40KB

          • memory/4852-27-0x0000000005530000-0x0000000005AD4000-memory.dmp

            Filesize

            5.6MB

          • memory/4852-28-0x0000000004F80000-0x0000000005012000-memory.dmp

            Filesize

            584KB

          • memory/4852-30-0x0000000074AC0000-0x0000000075270000-memory.dmp

            Filesize

            7.7MB