Analysis

  • max time kernel
    34s
  • max time network
    47s
  • platform
    windows10-1703_x64
  • resource
    win10-20240611-en
  • resource tags

    arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system
  • submitted
    09/07/2024, 23:04

General

  • Target

    a05acc9172e98ec6a6a7f923f5c648cc7a7c4e02bbcaaa5a6d9663229e662c24.exe

  • Size

    6.6MB

  • MD5

    63150c4846bfbcf27fa70ccaa8a01943

  • SHA1

    bfe32dcc00b041e0007a883af1588f354bb9f032

  • SHA256

    a05acc9172e98ec6a6a7f923f5c648cc7a7c4e02bbcaaa5a6d9663229e662c24

  • SHA512

    7c0c8065c83529ffe9cf092a7ffb19f59252015d643bded9cf5459e6e6a4c582962ab6e36b330275a79649fa6e8d3da01cb95352870a52fa159bb278b967cd90

  • SSDEEP

    98304:MPyYn2kIIR7ABl27MwarecfhZzwStzDtAVl3gaSZmg4MPyDv0bSpkmmf6osFQaiS:q7Vty27MJzw6z8X4mgJSyNyos6ac4l

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 53 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 7 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a05acc9172e98ec6a6a7f923f5c648cc7a7c4e02bbcaaa5a6d9663229e662c24.exe
    "C:\Users\Admin\AppData\Local\Temp\a05acc9172e98ec6a6a7f923f5c648cc7a7c4e02bbcaaa5a6d9663229e662c24.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4468
    • C:\Users\Admin\AppData\Local\Temp\is-C6JMC.tmp\a05acc9172e98ec6a6a7f923f5c648cc7a7c4e02bbcaaa5a6d9663229e662c24.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-C6JMC.tmp\a05acc9172e98ec6a6a7f923f5c648cc7a7c4e02bbcaaa5a6d9663229e662c24.tmp" /SL5="$6019E,6355320,266240,C:\Users\Admin\AppData\Local\Temp\a05acc9172e98ec6a6a7f923f5c648cc7a7c4e02bbcaaa5a6d9663229e662c24.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:4068
      • C:\Program Files\VS Revo Group\Revo Uninstaller\RevoUnin.exe
        "C:\Program Files\VS Revo Group\Revo Uninstaller\RevoUnin.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of SetWindowsHookEx
        PID:1568
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    PID:4576
  • C:\Windows\system32\browser_broker.exe
    C:\Windows\system32\browser_broker.exe -Embedding
    1⤵
    • Modifies Internet Explorer settings
    PID:1816
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Modifies registry class
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4568
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1976
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
    • Drops file in Windows directory
    • Modifies registry class
    PID:2608
  • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe
    "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdgeCP.exe" -ServerName:ContentProcess.AppX6z3cwk4fvgady6zya12j1cw28d228a7k.mca
    1⤵
      PID:660

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\VS Revo Group\Revo Uninstaller\RevoUnin.exe

            Filesize

            14.4MB

            MD5

            a9ccd5974308c40cbe6946b5e53d2de9

            SHA1

            3560538b946953c8b0ff7dd63b5bc4e088ba8240

            SHA256

            2df4dd7200737feab6e9dd77026584ddb328ad580c68205467356ac390a8f775

            SHA512

            866c2565f6c7fcc969d4c5db84fcb92e43ef4e8885ec129dc528020da8df599977b75b748abc0620b30e01a3f2980ffdc37731dfe4878b778dfdaef7911097ab

          • C:\Program Files\VS Revo Group\Revo Uninstaller\lang\english.ini

            Filesize

            102KB

            MD5

            5f57e969cb8f3ad0bbd859207a283bd5

            SHA1

            5a232b0eed2d7437513010c7a0af05cc4de3d90f

            SHA256

            f2e8f9e5cf4f057e3399ff66485a485cba419881aeeac997049941396bdf63d8

            SHA512

            c48ec65d7dc7f1ef77bc708cdb6f49106651fb6d715450168f4d5fa8105c24dfb43d7378d8b0ceba567942fd73fc95f7d41fd75c0824e619609981710b504cd0

          • C:\Users\Admin\AppData\Local\Packages\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\AC\MicrosoftEdge\Cache\RKLRQ0TR\favicon[1].ico

            Filesize

            2KB

            MD5

            780f9dc38a92057e7290fc69d765d73d

            SHA1

            ffe4d4bd2ea337c926dc71afbe309daa24352b41

            SHA256

            91e8f868eef6967dcfca5eeb8e428184a0f4dcd017246c78138e71e158a78db7

            SHA512

            d03786070ca50868ae449e31e3cec7a488196dc1d5eab344e7dec1d8f081bf7b376c8c42266b7171c6a46cba972321bbb954586fdb7fac978826b5586644ae92

          • C:\Users\Admin\AppData\Local\Temp\is-C6JMC.tmp\a05acc9172e98ec6a6a7f923f5c648cc7a7c4e02bbcaaa5a6d9663229e662c24.tmp

            Filesize

            1.3MB

            MD5

            7b77e7c3ebd213d95c4d909716f10030

            SHA1

            1c00eb97b4f154e209162bee83a84a6f1d1ef034

            SHA256

            a1bab1631135a982dfec6024b1ef8eb1ea2bce519cd832d9151e95e8def916d2

            SHA512

            fb6f95d42a936911b66861280cdeee77e2125c6b30141eb66daff402453d635a87a7f8ec9435ceb7ad4fddb473d6347a787bedb5649aa3abb234aceeeaaf8dcd

          • memory/1976-181-0x000001DEBF380000-0x000001DEBF480000-memory.dmp

            Filesize

            1024KB

          • memory/2608-483-0x00000236572E0000-0x00000236572E2000-memory.dmp

            Filesize

            8KB

          • memory/2608-485-0x0000023657400000-0x0000023657402000-memory.dmp

            Filesize

            8KB

          • memory/2608-509-0x0000023657220000-0x0000023657222000-memory.dmp

            Filesize

            8KB

          • memory/2608-507-0x00000236432F0000-0x0000023643300000-memory.dmp

            Filesize

            64KB

          • memory/2608-508-0x00000236432F0000-0x0000023643300000-memory.dmp

            Filesize

            64KB

          • memory/2608-496-0x00000236432F0000-0x0000023643300000-memory.dmp

            Filesize

            64KB

          • memory/2608-494-0x00000236432F0000-0x0000023643300000-memory.dmp

            Filesize

            64KB

          • memory/2608-481-0x00000236572D0000-0x00000236572D2000-memory.dmp

            Filesize

            8KB

          • memory/2608-486-0x00000236432F0000-0x0000023643300000-memory.dmp

            Filesize

            64KB

          • memory/2608-484-0x00000236432F0000-0x0000023643300000-memory.dmp

            Filesize

            64KB

          • memory/2608-196-0x0000023643500000-0x0000023643600000-memory.dmp

            Filesize

            1024KB

          • memory/2608-199-0x0000023653A00000-0x0000023653A02000-memory.dmp

            Filesize

            8KB

          • memory/2608-201-0x0000023653A20000-0x0000023653A22000-memory.dmp

            Filesize

            8KB

          • memory/2608-203-0x0000023653A40000-0x0000023653A42000-memory.dmp

            Filesize

            8KB

          • memory/2608-266-0x00000236551B0000-0x00000236551D0000-memory.dmp

            Filesize

            128KB

          • memory/2608-428-0x0000023654B20000-0x0000023654B40000-memory.dmp

            Filesize

            128KB

          • memory/2608-459-0x0000023655AA0000-0x0000023655AA2000-memory.dmp

            Filesize

            8KB

          • memory/2608-467-0x0000023655AE0000-0x0000023655AE2000-memory.dmp

            Filesize

            8KB

          • memory/2608-475-0x0000023655DA0000-0x0000023655DA2000-memory.dmp

            Filesize

            8KB

          • memory/2608-477-0x00000236572A0000-0x00000236572A2000-memory.dmp

            Filesize

            8KB

          • memory/2608-479-0x00000236572C0000-0x00000236572C2000-memory.dmp

            Filesize

            8KB

          • memory/2608-482-0x00000236432F0000-0x0000023643300000-memory.dmp

            Filesize

            64KB

          • memory/4068-6-0x0000000000400000-0x0000000000551000-memory.dmp

            Filesize

            1.3MB

          • memory/4068-9-0x0000000000400000-0x0000000000551000-memory.dmp

            Filesize

            1.3MB

          • memory/4068-170-0x0000000000400000-0x0000000000551000-memory.dmp

            Filesize

            1.3MB

          • memory/4068-126-0x0000000000400000-0x0000000000551000-memory.dmp

            Filesize

            1.3MB

          • memory/4468-0-0x0000000000400000-0x000000000044B000-memory.dmp

            Filesize

            300KB

          • memory/4468-171-0x0000000000400000-0x000000000044B000-memory.dmp

            Filesize

            300KB

          • memory/4468-8-0x0000000000400000-0x000000000044B000-memory.dmp

            Filesize

            300KB

          • memory/4468-2-0x0000000000401000-0x0000000000412000-memory.dmp

            Filesize

            68KB

          • memory/4576-166-0x000001F833D80000-0x000001F833D82000-memory.dmp

            Filesize

            8KB

          • memory/4576-147-0x000001F836A20000-0x000001F836A30000-memory.dmp

            Filesize

            64KB

          • memory/4576-131-0x000001F836920000-0x000001F836930000-memory.dmp

            Filesize

            64KB