Analysis

  • max time kernel
    1799s
  • max time network
    1142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-07-2024 15:47

General

  • Target

    QuickUpgrade.exe

  • Size

    470KB

  • MD5

    7ee9df8c8bcae05df1ca4f163fe1d8ad

  • SHA1

    8afb7a02451c7275d5c83c9adda12670980dae87

  • SHA256

    929b5910c1a2e4e595d7f2b7c7838317ae58671ca1fa38e2cc4144e093fe4afe

  • SHA512

    b149115c65a43fb709d06db2906164f90dda254d2a42f17b68b0bee14fdf3b1a56c03441b302fe7a62ba320d85bb023aaf16b2b590a9a40d611c5a9e64df99fa

  • SSDEEP

    3072:/MlF9kZSPyI9m1+rxy9dTDs/ZR1ctUA/86KF7HEyCwMQOrUsLVtPk7HoZ7WK7TRc:/Mlsi9u+ty9xElcyWK+EKfLP7WGo

Score
6/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\QuickUpgrade.exe
    "C:\Users\Admin\AppData\Local\Temp\QuickUpgrade.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:3540
    • C:\Users\Admin\AppData\Local\Temp\bitsum\processlasso\pl4sfx.exe
      "C:\Users\Admin\AppData\Local\Temp\bitsum\processlasso\pl4sfx.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Users\Admin\AppData\Local\Temp\PostUpdate.exe
        "C:\Users\Admin\AppData\Local\Temp\PostUpdate.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Users\Admin\AppData\Local\Temp\processlasso.exe
          /postupdate
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:3156
  • C:\Users\Admin\AppData\Local\Temp\bitsumsessionagent.exe
    C:\Users\Admin\AppData\Local\Temp\bitsumsessionagent.exe ----------------------------------------------------------------
    1⤵
    • Executes dropped EXE
    • Suspicious behavior: GetForegroundWindowSpam
    PID:632

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\PostUpdate.exe

    Filesize

    662KB

    MD5

    bb2506cfd974bbb671075703af3ba34d

    SHA1

    7dff63921930877f384d46ec2e83e9fc65631908

    SHA256

    304d78f9754a1921b95c2efc91d2e3b746ea7fe64a8e88f096900fcfef95ab97

    SHA512

    b18ede7522ce010e21b2f367276d1fd9bc8c8ae647f4534aefd2461879eaaa4dcfcaabdd47401de7764add7e9a4784afacb16376bd518c885fc19b6e1869b580

  • C:\Users\Admin\AppData\Local\Temp\QuickUpgrade.exe.Replacement

    Filesize

    471KB

    MD5

    3ca525e181221bea925983a7df61f712

    SHA1

    8f4d165464c6b9c275700b44a9f4edc3f5462cbb

    SHA256

    13a9fbdf75a5051499685f2b140788e46a53af6890af094dbfe61ca766316d2f

    SHA512

    ec73d2c502a15da048cabc85f16a0b65f9a8e81a7a3dd8e5108ea594e5c06e1e08d314fc7b72f6276a513aa1a6da1ad0b6b75e808842295e9e811e1e85c5b7a8

  • C:\Users\Admin\AppData\Local\Temp\bitsum\processlasso\pl4sfx.exe

    Filesize

    2.9MB

    MD5

    5e30f03479a5607d89c4f5f372deae0b

    SHA1

    99ae6721a7b9efdcc23160610f23f71304ff039e

    SHA256

    e0e414a143c82f06038cfaa468bdd39a39c683e07dc310923e6495bbc8d6751f

    SHA512

    731ace4798c98522aa131f7e0f23250a99b502210dc6876a87099975abfae410e4913896f701db70845f577baa70db40d7bf1e82dc7f2ce29659228d7f13d7db

  • C:\Users\Admin\AppData\Local\Temp\bitsumsessionagent.exe

    Filesize

    177KB

    MD5

    7f55918ca6706935ebf3000e277ec7f3

    SHA1

    725b09394b76ccc066ac4fbc00357fbbb2a60f34

    SHA256

    7592cdd84b1085851f3a6ef03bc386a381117cdb884c720be1bd8dcf62a296ea

    SHA512

    fe218d72e4e17097143860b57f22de32ecac1b5cbcb93e856404bed7884ce2b389d39f3ed654a1d8bdc5f08847ebfd3fdf9ba0f1f1efd32e55fe6bf250f9afc9

  • C:\Users\Admin\AppData\Local\Temp\pl_rsrc_english.dll

    Filesize

    1.9MB

    MD5

    40d2b640a737039f0ae3bea77470cdfd

    SHA1

    f22c0a3ed620659ec76b1dc499b9965e4b6b3a2b

    SHA256

    be8a66f9560f0f3d2dcb12a3608deeae7a64e87340462c0f409c640580c514f8

    SHA512

    17b8d4c47875b909e4a70373033dd28cde2f2805509845eaf0ac264c85ddeec657d17276b38f37211d4102de87a8b0c91c646d17826b18c2f4f3f9badc4d3b29

  • C:\Users\Admin\AppData\Local\Temp\pl_rsrc_temp.dll

    Filesize

    1.9MB

    MD5

    258063bdcafc8fd2a2a50d9065989ad6

    SHA1

    ee1bebd8c909d8ebe3b5b6f155c68fc7e6696e31

    SHA256

    01b75b825eef6092db03156d3e87342a875bfd355a6cf8d9a87365f4c5fda85f

    SHA512

    b0732da44481e09f38e903fab2bf81447bf661d785631ab2b7421a89b80ef2db38203d85dbea5535c5bb09e8550a2ca737db6c86eac372515ebdf803a59cb5ca

  • C:\Users\Admin\AppData\Local\Temp\processlasso.exe

    Filesize

    1.8MB

    MD5

    895af2aaf9c99ea08f42d52b97e50ec1

    SHA1

    e514cbaf6d9e243f107efc74cf2fe7646d87dcb3

    SHA256

    a160cee89af34cfefa86ba433aa367eb36a593782bc2c014e9744d15436b3870

    SHA512

    dafe2dc0b3b7d612cdd07a6a870b5f881a8fa5d371040b4bb06d6b5fc6e84eb979ba89828cd7f76ac17b6c414174d8fe349ee44fe5bcdad422ad901657952bb9