Analysis

  • max time kernel
    119s
  • max time network
    118s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/07/2024, 03:16

General

  • Target

    473af2b09ea68fa56f19f779a55e2d60N.exe

  • Size

    328KB

  • MD5

    473af2b09ea68fa56f19f779a55e2d60

  • SHA1

    c9a1250443b5fe9d8cc505e7bc975c9c1b565f97

  • SHA256

    7efd63d0a01848bbd335e50af51ac21bb7654d6e7373e730b3b81dfb4f31a530

  • SHA512

    a1de6aa8ebe74fcdab902efe056b3fadbca3033287407e415f9266e425074a2af7c5653cbb5a66849083f929766750c44ee4737561d54add1f1105fff74bafe4

  • SSDEEP

    6144:J2XgY8FFX7Z6A/P352p4gFs/e8PeAZuon2T5T7UcIGMAQTeJ:J2X1cFx/PAp4ks/e6Fn2dEZGjQSJ

Score
10/10

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 4 IoCs
  • UPX packed file 14 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 61 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\473af2b09ea68fa56f19f779a55e2d60N.exe
    "C:\Users\Admin\AppData\Local\Temp\473af2b09ea68fa56f19f779a55e2d60N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Users\Admin\AppData\Local\Temp\473af2b09ea68fa56f19f779a55e2d60N.exe
      "C:\Users\Admin\AppData\Local\Temp\473af2b09ea68fa56f19f779a55e2d60N.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\FIYUV.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:960
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Console Window Host" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /f
          4⤵
          • Adds Run key to start application
          PID:3636
      • C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe
        "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3456
        • C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe
          "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          PID:3880
        • C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe
          "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3012
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3336
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
              6⤵
              • Modifies firewall policy service
              • Modifies registry key
              PID:2472
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2528
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe:*:Enabled:Windows Messanger" /f
              6⤵
              • Modifies firewall policy service
              • Modifies registry key
              PID:4108
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:3560
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
              6⤵
              • Modifies firewall policy service
              • Modifies registry key
              PID:4384
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\conhost.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2132
            • C:\Windows\SysWOW64\reg.exe
              REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\conhost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\conhost.exe:*:Enabled:Windows Messanger" /f
              6⤵
              • Modifies firewall policy service
              • Modifies registry key
              PID:712

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\473af2b09ea68fa56f19f779a55e2d60N.exe

    Filesize

    328KB

    MD5

    473af2b09ea68fa56f19f779a55e2d60

    SHA1

    c9a1250443b5fe9d8cc505e7bc975c9c1b565f97

    SHA256

    7efd63d0a01848bbd335e50af51ac21bb7654d6e7373e730b3b81dfb4f31a530

    SHA512

    a1de6aa8ebe74fcdab902efe056b3fadbca3033287407e415f9266e425074a2af7c5653cbb5a66849083f929766750c44ee4737561d54add1f1105fff74bafe4

  • C:\Users\Admin\AppData\Local\Temp\FIYUV.txt

    Filesize

    154B

    MD5

    0d0a854e96bddf0e7df7f5f024674226

    SHA1

    f45ca9c7f935422ddfb0550febdfc7a09baf2d98

    SHA256

    5bab0b5c3ef8a28a7246854074a5a469c602a10ac803d18f2102399597d35907

    SHA512

    8b6db387b3bb5774c691bcdd4d9f3a147e1556eee89fe1de929464510c01b14495157c14cbb355fc850b79dee500b8be7ae7a0c3b5ea0916d6eb9154f9ae73a8

  • C:\Users\Admin\AppData\Roaming\Adobe\conhost.exe

    Filesize

    328KB

    MD5

    7c23f7686c34dcd03498c50c6551dd4d

    SHA1

    ed9bfc7b36aa640cb67bee087c0d37efdfc3fd35

    SHA256

    b9d1e46b663fe89c1961fad4f07be7cb0ba591fd1983e75bdf49718ec7bc33f5

    SHA512

    dd01a27abbce659c656e38f5494eb60de95de15600398b0d440ebf38e503c25717a2ae2c3340bb55ff3a43a7a1c456d45e6e5dd1fe8b6f28590f214d2e3b8eef

  • memory/1884-60-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1884-10-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1884-7-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1884-11-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/1884-37-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/3012-53-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/3012-73-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/3012-71-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/3012-66-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/3012-65-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/3012-46-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/3012-52-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/3012-51-0x0000000000400000-0x000000000047B000-memory.dmp

    Filesize

    492KB

  • memory/3128-2-0x0000000002BF0000-0x0000000002BF1000-memory.dmp

    Filesize

    4KB

  • memory/3128-4-0x0000000002C70000-0x0000000002C71000-memory.dmp

    Filesize

    4KB

  • memory/3128-3-0x0000000002C30000-0x0000000002C31000-memory.dmp

    Filesize

    4KB

  • memory/3128-6-0x0000000002C70000-0x0000000002C71000-memory.dmp

    Filesize

    4KB

  • memory/3128-5-0x0000000002BF0000-0x0000000002BF1000-memory.dmp

    Filesize

    4KB

  • memory/3456-58-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/3456-38-0x0000000000400000-0x0000000000456000-memory.dmp

    Filesize

    344KB

  • memory/3880-64-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB