Analysis

  • max time kernel
    133s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/06/2024, 01:13

General

  • Target

    0abf41123877910a64eddabfbcd8ddde.exe

  • Size

    850KB

  • MD5

    0abf41123877910a64eddabfbcd8ddde

  • SHA1

    da6d3f46fa8192f4f4f56c2b227255077617a5e5

  • SHA256

    49499dbdc2175d78d35812df6bdcce3eb6916b315f0e0c7bdf1f5af3f3d59088

  • SHA512

    c9b5046d7c1c90ff499ff39120e8d50d326eeed60638908f1eb2d896509ba1434e00255f7446c336793ac4ef3eb0bb5ac1c8313725a0fc804bfd34f143772e10

  • SSDEEP

    12288:LAnnfuU/BqIC2n9bD+3Xhgv8AidVh81FBGNE6sqne+gSGmaqhzdNqjbkHXHj6WQJ:sfuvO9ehgv8NxKGvsqSlqhBNy43kRDD

Malware Config

Signatures

  • UAC bypass 3 TTPs 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks whether UAC is enabled 1 TTPs 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SendNotifyMessage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0abf41123877910a64eddabfbcd8ddde.exe
    "C:\Users\Admin\AppData\Local\Temp\0abf41123877910a64eddabfbcd8ddde.exe"
    1⤵
    • UAC bypass
    • Checks computer location settings
    • Checks whether UAC is enabled
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:3492
    • C:\Users\Admin\AppData\Local\Temp\crap.exe
      "C:\Users\Admin\AppData\Local\Temp\crap.exe"
      2⤵
      • UAC bypass
      • Adds policy Run key to start application
      • Executes dropped EXE
      • Adds Run key to start application
      • Checks whether UAC is enabled
      • Suspicious use of AdjustPrivilegeToken
      • System policy modification
      PID:396
    • C:\Users\Admin\AppData\Local\Temp\M2-Tradehack.exe
      "C:\Users\Admin\AppData\Local\Temp\M2-Tradehack.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:4948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\M2-Tradehack.exe

    Filesize

    491KB

    MD5

    71f60b4093d45433f440f3c19fd762dd

    SHA1

    6abd7237cfb74f3dcb3086c86663bfb11b8a41a8

    SHA256

    39dada2a77655d9beb536a9092a0298f655588bc18542d0d8ffd75f2ef1b929e

    SHA512

    cac259b33ea6b8fb57985e27bd1fc711d29d7269ddfee4cfb8fbb12e3b8df4b8dd0fce132ecbaa089d18972e419d308521df726741c61e46555218e4ec891a37

  • C:\Users\Admin\AppData\Local\Temp\crap.exe

    Filesize

    344KB

    MD5

    37cf85bacfbf0e89070784f4c5d669d7

    SHA1

    c5a3f98ff3cda34488ffc4c509b5db87badb344a

    SHA256

    76bab8d0a284abf4b90917ab271282ea183294b5a3c6e2f885e8635c3433ba49

    SHA512

    bc2dfc68e472ddd1886102db1eca33ee0a8ede07fd6eac0589093dc621a936caf3a224801736a8097a119b15d51b81ae283835e617b9a8f6364938560f64e531

  • memory/396-19-0x0000000075072000-0x0000000075073000-memory.dmp

    Filesize

    4KB

  • memory/396-30-0x0000000075070000-0x0000000075621000-memory.dmp

    Filesize

    5.7MB

  • memory/396-32-0x0000000075070000-0x0000000075621000-memory.dmp

    Filesize

    5.7MB

  • memory/396-40-0x0000000075070000-0x0000000075621000-memory.dmp

    Filesize

    5.7MB

  • memory/3492-0-0x00007FFBA5D65000-0x00007FFBA5D66000-memory.dmp

    Filesize

    4KB

  • memory/3492-1-0x00007FFBA5AB0000-0x00007FFBA6451000-memory.dmp

    Filesize

    9.6MB

  • memory/3492-2-0x000000001BF80000-0x000000001C44E000-memory.dmp

    Filesize

    4.8MB

  • memory/3492-3-0x000000001C4F0000-0x000000001C58C000-memory.dmp

    Filesize

    624KB

  • memory/3492-13-0x00007FFBA5AB0000-0x00007FFBA6451000-memory.dmp

    Filesize

    9.6MB

  • memory/3492-31-0x00007FFBA5AB0000-0x00007FFBA6451000-memory.dmp

    Filesize

    9.6MB