Analysis

  • max time kernel
    94s
  • max time network
    95s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/07/2024, 14:37

General

  • Target

    c2b7634a6cf8b254bf9f8e1c2439d7f0N.exe

  • Size

    494KB

  • MD5

    c2b7634a6cf8b254bf9f8e1c2439d7f0

  • SHA1

    fe253a8bf0dd31cfcf63e6faba701546716364eb

  • SHA256

    81b23c3d0c8b428dbcf93b30d037e4281f4cc7b76747fa5272faa16008503260

  • SHA512

    1b636f743b428ce6d5030312b027dd69dcdaf127ee861bd21f9aad806dde4704f3b157c391821061eeae07889ebc885f863e1469d12140a61b971d1265feadb5

  • SSDEEP

    12288:9nKfyxV2ImdvPGBFfi8WuJ6+1x0KCYT88VtX0E:BKfwV2HtPgFfN9/pDX

Score
9/10

Malware Config

Signatures

  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c2b7634a6cf8b254bf9f8e1c2439d7f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\c2b7634a6cf8b254bf9f8e1c2439d7f0N.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks computer location settings
    • Enumerates system info in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Users\Admin\AppData\Local\Temp\n1981\s1981.exe
      "C:\Users\Admin\AppData\Local\Temp\n1981\s1981.exe" ins.exe /t 538089aa561ca327238b4d7f /e 12714677 /u 3609b66c-d077-11e3-8a58-80c16e6f498c /v "C:\Users\Admin\AppData\Local\Temp\c2b7634a6cf8b254bf9f8e1c2439d7f0N.exe"
      2⤵
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:4720
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2948 -s 4500
      2⤵
      • Program crash
      PID:1804
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2948 -ip 2948
    1⤵
      PID:2424

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\n1981\s1981.exe

            Filesize

            286KB

            MD5

            c268c937148a046322219b77c5a031b0

            SHA1

            e83ed15c7ef694a2281955a16ffeec0672c56107

            SHA256

            c913057e15ac6b27b204be58b52132d62901746075faa298bb0d08c84958d51e

            SHA512

            44cc28c7a707a37e49afdd23af42a620a8eb78f7b54913b41d8cd5eadd5ea37a6eb16e83d99dd75bbc736e70970a7c94b33d55950ed3dda45302477ea3868a19

          • memory/4720-11-0x00007FFEFD0A5000-0x00007FFEFD0A6000-memory.dmp

            Filesize

            4KB

          • memory/4720-12-0x00007FFEFCDF0000-0x00007FFEFD791000-memory.dmp

            Filesize

            9.6MB

          • memory/4720-28-0x000000001C560000-0x000000001C56A000-memory.dmp

            Filesize

            40KB

          • memory/4720-31-0x000000001CBB0000-0x000000001D07E000-memory.dmp

            Filesize

            4.8MB

          • memory/4720-32-0x000000001D120000-0x000000001D1BC000-memory.dmp

            Filesize

            624KB

          • memory/4720-33-0x000000001C140000-0x000000001C148000-memory.dmp

            Filesize

            32KB

          • memory/4720-34-0x00007FFEFCDF0000-0x00007FFEFD791000-memory.dmp

            Filesize

            9.6MB

          • memory/4720-35-0x00007FFEFCDF0000-0x00007FFEFD791000-memory.dmp

            Filesize

            9.6MB

          • memory/4720-36-0x00007FFEFCDF0000-0x00007FFEFD791000-memory.dmp

            Filesize

            9.6MB

          • memory/4720-37-0x00007FFEFCDF0000-0x00007FFEFD791000-memory.dmp

            Filesize

            9.6MB

          • memory/4720-38-0x00000000201F0000-0x0000000020252000-memory.dmp

            Filesize

            392KB

          • memory/4720-39-0x00000000207A0000-0x00000000208DC000-memory.dmp

            Filesize

            1.2MB

          • memory/4720-40-0x0000000020DF0000-0x00000000212FE000-memory.dmp

            Filesize

            5.1MB

          • memory/4720-41-0x00007FFEFCDF0000-0x00007FFEFD791000-memory.dmp

            Filesize

            9.6MB

          • memory/4720-43-0x00007FFEFCDF0000-0x00007FFEFD791000-memory.dmp

            Filesize

            9.6MB