Analysis

  • max time kernel
    97s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 02:27

General

  • Target

    b1dec4e4ed1ceaf448565d0778995175ad44941d6f617fcd9df00f6d43d68137.exe

  • Size

    268KB

  • MD5

    ed19e1a621eba1a37ad406075a6db9d7

  • SHA1

    e23ce29fa6a15f9eb167f3db5731fc2af096edb6

  • SHA256

    b1dec4e4ed1ceaf448565d0778995175ad44941d6f617fcd9df00f6d43d68137

  • SHA512

    86a63aa8b8c1dd34ae6ee41ab90ac73f4a9f87b8b74e75f14abd56ef1ec3e83b5a29891234c2ffdea6470208f2ba98e4c7cfca7feecf6873e0b8b57a36ece9aa

  • SSDEEP

    1536:N4eK+IFjWfoPbuaTRM3nFkwHbaA3LL0idWwiQcmWkF:G+IF6foPCaTRMXbaev0FQcmWk

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b1dec4e4ed1ceaf448565d0778995175ad44941d6f617fcd9df00f6d43d68137.exe
    "C:\Users\Admin\AppData\Local\Temp\b1dec4e4ed1ceaf448565d0778995175ad44941d6f617fcd9df00f6d43d68137.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3080
    • C:\Users\Admin\AppData\Local\Microsoft\audiohd.exe
      "C:\Users\Admin\AppData\Local\Microsoft\audiohd.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4304
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-Type -Path "C:\Users\Admin\AppData\Local\Microsoft\local.cs"; [LocalServ]::Listen()
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3956

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\audiohd.exe

          Filesize

          276KB

          MD5

          a9591e257bdbcf7369c1693adde4885b

          SHA1

          637adcc743cfc645ac3706e480fd05feacafa9ec

          SHA256

          cbd40162151a4c03ad88b903014f8ce634bc6f0d785ddecfd060e727faeda278

          SHA512

          f05cc6799f79bd6cde2cc380c4b0bdad479b78c1f6a77e2ecdeef7d60af6ee61b619e89cd8bb33c1fb9c9f75594873ec5660808f3de288e0209199274fbc37e0

        • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_nusckpl4.btq.ps1

          Filesize

          60B

          MD5

          d17fe0a3f47be24a6453e9ef58c94641

          SHA1

          6ab83620379fc69f80c0242105ddffd7d98d5d9d

          SHA256

          96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

          SHA512

          5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

        • memory/3080-1-0x0000000000B50000-0x0000000000B66000-memory.dmp

          Filesize

          88KB

        • memory/3080-2-0x00000000059E0000-0x0000000005F84000-memory.dmp

          Filesize

          5.6MB

        • memory/3080-3-0x0000000005530000-0x00000000055CC000-memory.dmp

          Filesize

          624KB

        • memory/3080-0-0x0000000074D2E000-0x0000000074D2F000-memory.dmp

          Filesize

          4KB

        • memory/3956-39-0x0000000004B90000-0x0000000004BAE000-memory.dmp

          Filesize

          120KB

        • memory/3956-36-0x0000000005840000-0x0000000005B94000-memory.dmp

          Filesize

          3.3MB

        • memory/3956-20-0x0000000074D20000-0x00000000754D0000-memory.dmp

          Filesize

          7.7MB

        • memory/3956-21-0x0000000074D20000-0x00000000754D0000-memory.dmp

          Filesize

          7.7MB

        • memory/3956-22-0x00000000050F0000-0x0000000005718000-memory.dmp

          Filesize

          6.2MB

        • memory/3956-23-0x0000000004E30000-0x0000000004E52000-memory.dmp

          Filesize

          136KB

        • memory/3956-24-0x0000000004FD0000-0x0000000005036000-memory.dmp

          Filesize

          408KB

        • memory/3956-25-0x0000000005720000-0x0000000005786000-memory.dmp

          Filesize

          408KB

        • memory/3956-45-0x0000000074D20000-0x00000000754D0000-memory.dmp

          Filesize

          7.7MB

        • memory/3956-19-0x00000000024F0000-0x0000000002526000-memory.dmp

          Filesize

          216KB

        • memory/3956-42-0x00000000063E0000-0x00000000063FA000-memory.dmp

          Filesize

          104KB

        • memory/3956-41-0x00000000074F0000-0x0000000007B6A000-memory.dmp

          Filesize

          6.5MB

        • memory/3956-40-0x0000000005F20000-0x0000000005F6C000-memory.dmp

          Filesize

          304KB

        • memory/4304-16-0x0000000074D20000-0x00000000754D0000-memory.dmp

          Filesize

          7.7MB

        • memory/4304-38-0x00000000061E0000-0x00000000061EA000-memory.dmp

          Filesize

          40KB

        • memory/4304-37-0x0000000006BD0000-0x0000000006C62000-memory.dmp

          Filesize

          584KB

        • memory/4304-17-0x0000000074D20000-0x00000000754D0000-memory.dmp

          Filesize

          7.7MB

        • memory/4304-46-0x0000000074D20000-0x00000000754D0000-memory.dmp

          Filesize

          7.7MB

        • memory/4304-47-0x0000000074D20000-0x00000000754D0000-memory.dmp

          Filesize

          7.7MB