Analysis

  • max time kernel
    149s
  • max time network
    102s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 04:00

General

  • Target

    ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe

  • Size

    1.5MB

  • MD5

    2cd99159c94188afe5cf0a4cf126fb88

  • SHA1

    a0cb44f510a907ab0c5a6e305d444613017240d2

  • SHA256

    ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad

  • SHA512

    a2cc82ef39a15c309a40da9ff2cdeecd3e81aaadf45e46cc33c42d92b573ea274e9d9feca2136dd2e16c61d714bc0e9956b6a0a6f7181bc076f2932a43f152d3

  • SSDEEP

    49152:oJnfQW0e9+tqf/2vwHTwQWTG6sY7BFZOxu6FNkKFNku:oCWZrHhWTG6VzHkk0ku

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops file in System32 directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies Internet Explorer start page 1 TTPs 2 IoCs
  • Modifies registry class 25 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe
    "C:\Users\Admin\AppData\Local\Temp\ec2080b7acb90e0dd02e5ccd08edc42ce2d6b5395ebca3f31bed88a39923aaad.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Windows\system32\Del.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2264
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c C:\Windows\system32\Del.bat
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2024
        • C:\Windows\SysWOW64\regedit.exe
          regedit /s C:\Windows\system32\favicon.reg
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Modifies registry class
          • Runs .reg file with regedit
          PID:960
    • C:\Windows\SysWOW64\ctfnom_.exe
      C:\Windows\system32\ctfnom_.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Modifies Internet Explorer start page
      • Suspicious use of SetWindowsHookEx
      PID:1332

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\Del.bat

          Filesize

          147B

          MD5

          b58a5f659c85978342cf6130f1fdfa17

          SHA1

          9f7812a274d8debb2801cb8616c1fd4c5891b3dc

          SHA256

          7f451eb5acf109c0b0a61a7e0c9e66c2562c8baa4d2ad5efaee9fd2a7434d8cd

          SHA512

          382d494ba0f7cc7ee05e74f7165a33aefb93236bb4f5f06aac292b134100d927caca70138fb86c650d99f291844e52e13dbc99de967f636b6b763ea83652e3b7

        • C:\Windows\SysWOW64\Del.vbs

          Filesize

          93B

          MD5

          8cf96bc792eca45cff7728ad63086a3d

          SHA1

          21517b7e4c2aa1aaf7aa5a2b378c81f49c2d2b27

          SHA256

          44afb3f2711eaa8be0a622e88d9ac73854433d8101e9e02341330e6407c4b493

          SHA512

          25bc1c86d5c48bb31498520a4dbd10d9b129fa137f0781915d3bda051d5ea7c209ca137f42c4a26b71563235214dd1af35f1434dbd8d8ebf7dbe8a0002f6580d

        • C:\Windows\SysWOW64\ctfnom_.exe

          Filesize

          10KB

          MD5

          2e735e75aa993f6915a90a3891fd3718

          SHA1

          73ec3e4ba7dae5e26011d206e4bec5235a3175c3

          SHA256

          f8d29e1e0df238650ff4ea650d0f151a17be09256bc66f72ffdddb3c23e1b7d5

          SHA512

          58c9d0efd8ffc1d7e3b3001e7bbc781e762bb3ddc2682997f8b9e8522473498cd104ad54385e697c1b6f5096fa657e4c3071a988cb853015943043208e69810a

        • C:\Windows\SysWOW64\favicon.reg

          Filesize

          5KB

          MD5

          84a824b138dc2382d367ddbf818c8ae5

          SHA1

          86f14284d9eecfeba769664d7cb26806c8fd37f5

          SHA256

          7053ebfe5a3c5d16cd9b6be7cc7bb10636cb611760c4394300b762a8f7bddf6e

          SHA512

          ff78f1d3763bff2af7e30ae78c317e0a122761307f0aa662f81cca68e3de8b687027f58b5ed4f33ee050be07a1d1c231edd0cf99938cf50913902a5a51f35ed2

        • memory/1332-19-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1332-22-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1332-21-0x0000000000570000-0x0000000000571000-memory.dmp

          Filesize

          4KB

        • memory/1332-29-0x0000000000400000-0x000000000040E000-memory.dmp

          Filesize

          56KB

        • memory/1332-30-0x0000000000570000-0x0000000000571000-memory.dmp

          Filesize

          4KB

        • memory/3616-2-0x00000000005F0000-0x00000000005F1000-memory.dmp

          Filesize

          4KB

        • memory/3616-0-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3616-26-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/3616-1-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB