Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-07-2024 08:06

General

  • Target

    Loader 3.0.exe

  • Size

    147KB

  • MD5

    ff4cd364323fc2048c35783a38070aef

  • SHA1

    4736172dd07a3a196343b94dd56b4e4edc0f2bce

  • SHA256

    6dd7522accb6773bade16720b53ca577574defae5b1c7caf4b7fc6826dfed7e7

  • SHA512

    c72b07b78ccbcfad14fa9f7bc3e8a086c29969b4f7f30dbe57a1a173cd82d61a20bf5ead0bc7b627d5d7f7f0def71710e2ce09590be7a886ad6c9414981eb961

  • SSDEEP

    1536:FzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDEtDyI4njdbJBGCkmsQwvB6jr4j:GqJogYkcSNm9V7Dk4F91qYUrnbT

Malware Config

Signatures

  • Renames multiple (655) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loader 3.0.exe
    "C:\Users\Admin\AppData\Local\Temp\Loader 3.0.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1712
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Drops file in System32 directory
      PID:900
    • C:\ProgramData\E37B.tmp
      "C:\ProgramData\E37B.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\E37B.tmp >> NUL
        3⤵
          PID:4716
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
      1⤵
        PID:3700
      • C:\Windows\system32\printfilterpipelinesvc.exe
        C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
        1⤵
        • Drops file in System32 directory
        • Suspicious use of WriteProcessMemory
        PID:5104
        • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
          /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{BEE2442A-02B3-473A-877C-2B98F9ECCDEA}.xps" 133655044043390000
          2⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:3636

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\$Recycle.Bin\S-1-5-21-47134698-4092160662-1261813102-1000\EEEEEEEEEEE

        Filesize

        129B

        MD5

        f1ed2fec40d58950bd70516152858dac

        SHA1

        35ecdc6022e8edfab0ab17dbfde90fd76b1d1b57

        SHA256

        3bec15205a80275a6807416bf8375abc50266e10dae12755dd92dc0603d1788e

        SHA512

        3573ad6b5df46e8c4894066f180ef12459c3501d502fdb372df154b7152536b5130104f74a43ad2c8657ac2f433ef5a4f008bcd2bf59c4ce30a64f8b24b4dbbd

      • C:\Jw5Jgl9mC.README.txt

        Filesize

        1KB

        MD5

        8b28296a2c168d86adbafc888d0f95f0

        SHA1

        49d6b109bf24f39c2c0f62c0796b8693c0bd99e5

        SHA256

        7b3daacf846fe79840647e67d9c5226a7fda47d5b32c24d874654e8ff78ffcc9

        SHA512

        b0f0e0a6f2962250c3b9f87637854756e7a0fcde561aae14654d0dcd1e1013876442c0354e41c5bc8e3ef57f170ac2073874ff22fdc5656f62f930350f9df6ac

      • C:\ProgramData\E37B.tmp

        Filesize

        14KB

        MD5

        294e9f64cb1642dd89229fff0592856b

        SHA1

        97b148c27f3da29ba7b18d6aee8a0db9102f47c9

        SHA256

        917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

        SHA512

        b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

      • C:\Users\Admin\AppData\Local\Temp\DDDDDDDDDDDDDD

        Filesize

        147KB

        MD5

        59e5a822a4188ceace98691f3c05c826

        SHA1

        1ae98082110c7130d1717ccc3d565ed01341f064

        SHA256

        17d6f49e5fddb6b67b528e1e1f00a4f0bba2e38b770c6e869c20cac2911aa534

        SHA512

        b271d503e4d9703071c70b160380ced0948ebbede783fc0580d30de93154eebbab50322a016eefb7610e2ad5ab520670ff6d8f3533d4ee19b398567a23f1ce02

      • C:\Users\Admin\AppData\Local\Temp\{A0C7A420-E281-48CD-A60F-F36646BABE58}

        Filesize

        4KB

        MD5

        141f06ccac15819661b4b9ee7ed2400f

        SHA1

        bc79df6107f872d656ca9f66f1048eb78e713549

        SHA256

        7075a47a7e161f53a53cb69ce1c25f368b1a86d1a667e8e92861dbb2bc9e6693

        SHA512

        8cc21467dd1a3f93be1848a075de788d4a4d57d11103290a1d3a40cde7786782c6e481f769399590131324d21095832341078c76ad9b6501ca008bccea5408a3

      • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

        Filesize

        4KB

        MD5

        dcf80982ddeee8822eb72527d19f4809

        SHA1

        ef262b723d693175f74dfbce80bb47d4598161fc

        SHA256

        984b2e6e4e33841124a8a62adbd64ce1fea2581d73d4ff98de8127619c685bd6

        SHA512

        c1279248795a8debc7454c09a7c60ec5650debcfb9dd8d08e41396cd696f35baac8b7e89d5261646bfdc406cffdb8f22854589180e8eab38f228aa2d68c7c2a1

      • F:\$RECYCLE.BIN\S-1-5-21-47134698-4092160662-1261813102-1000\DDDDDDDDDDD

        Filesize

        129B

        MD5

        9cc6bbae6bc3753a8b127a99170090d4

        SHA1

        28c7a9ab96ac5e5d56f9cc6cc8c1b7d2becfe285

        SHA256

        1e4e103ac59c89b7d275ce37535ca97a68993d45f7d20d1644b08555e70f62ad

        SHA512

        a04323f09421692db28323387ccbd79dd120bf559cd0b5068d185673af68220ac4d495cede1ff3eadc6533820297cd056261155aff9cd33d5eeef5a259906e33

      • memory/1712-1-0x0000000002C80000-0x0000000002C90000-memory.dmp

        Filesize

        64KB

      • memory/1712-0-0x0000000002C80000-0x0000000002C90000-memory.dmp

        Filesize

        64KB

      • memory/3636-2853-0x00007FFE36A10000-0x00007FFE36A20000-memory.dmp

        Filesize

        64KB

      • memory/3636-2851-0x00007FFE36A10000-0x00007FFE36A20000-memory.dmp

        Filesize

        64KB

      • memory/3636-2854-0x00007FFE36A10000-0x00007FFE36A20000-memory.dmp

        Filesize

        64KB

      • memory/3636-2883-0x00007FFE34630000-0x00007FFE34640000-memory.dmp

        Filesize

        64KB

      • memory/3636-2884-0x00007FFE34630000-0x00007FFE34640000-memory.dmp

        Filesize

        64KB

      • memory/3636-2852-0x00007FFE36A10000-0x00007FFE36A20000-memory.dmp

        Filesize

        64KB

      • memory/3636-2850-0x00007FFE36A10000-0x00007FFE36A20000-memory.dmp

        Filesize

        64KB