Analysis

  • max time kernel
    94s
  • max time network
    109s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/08/2024, 05:32

General

  • Target

    658934799d868a8c738d6baf0ad6b580N.exe

  • Size

    2.3MB

  • MD5

    658934799d868a8c738d6baf0ad6b580

  • SHA1

    828bb90f0c040ced924672dfe6e6a91e59a59901

  • SHA256

    e687a95ccec40ce535d75314f7b735aa2b937c6ee1e0c0dbad339f6995101cc9

  • SHA512

    39688322b40c84046c3ace5a03db804ea89cd0b2006ad44db1234f97dab2c32385f994378980b9209810b6bfb3622f912a4c189785caa46a2450ff4163487817

  • SSDEEP

    49152:04bPSh4tbTChxKCnFnQXBbrtgb/iQvu0UHOr:p7Sh4t6hxvWbrtUTrUHOr

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\658934799d868a8c738d6baf0ad6b580N.exe
    "C:\Users\Admin\AppData\Local\Temp\658934799d868a8c738d6baf0ad6b580N.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1856
    • C:\Windows\SysWOW64\explorer.exe
      explorer.exe
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4780
      • C:\Users\Admin\AppData\Local\Temp\@AE7465.tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\@AE7465.tmp.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4676
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2692
          • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe
            "C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe"
            5⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:4964
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1636
              • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe
                "C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe" /i 4964
                7⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Adds Run key to start application
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of WriteProcessMemory
                PID:3656
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat" "
                  8⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4300
                  • C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                    "C:\Users\Admin\AppData\Local\Temp\wtmps.exe"
                    9⤵
                    • Executes dropped EXE
                    • Drops file in System32 directory
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:4036
                    • C:\Windows\SysWOW64\mscaps.exe
                      "C:\Windows\system32\mscaps.exe" /C:\Users\Admin\AppData\Local\Temp\wtmps.exe
                      10⤵
                      • Executes dropped EXE
                      PID:2652
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat" "
          4⤵
          • System Location Discovery: System Language Discovery
          PID:4788
      • C:\Users\Admin\AppData\Local\Temp\658934799d868a8c738d6baf0ad6b580N.exe
        "C:\Users\Admin\AppData\Local\Temp\658934799d868a8c738d6baf0ad6b580N.exe"
        3⤵
        • Executes dropped EXE
        PID:3708

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\658934799d868a8c738d6baf0ad6b580N.exe

          Filesize

          538KB

          MD5

          ddbc4e046dd79c887006cce9863aa21f

          SHA1

          89ea1eaad9f1758012400f6fb5501dc9d3e563bf

          SHA256

          7e7568595fc5843e900fc2cc1c840ae9046a0f2a4169f519a581617894b2ea2c

          SHA512

          aeac27937ca78d5d36c293937831b85a72caeec7a89095c19faafc33f76c3f42e4ab36cf1a9e89433845afaf238512d996555e1fa188dd599fb6395f612f8231

        • C:\Users\Admin\AppData\Local\Temp\859B.tmp

          Filesize

          406B

          MD5

          37512bcc96b2c0c0cf0ad1ed8cfae5cd

          SHA1

          edf7f17ce28e1c4c82207cab8ca77f2056ea545c

          SHA256

          27e678bf5dc82219d6edd744f0b82567a26e40f8a9dcd6487205e13058e3ed1f

          SHA512

          6d4252ab5aa441a76ce2127224fefcb221259ab4d39f06437b269bd6bfdaae009c8f34e9603ec734159553bc9f1359bdd70316cd426d73b171a9f17c41077641

        • C:\Users\Admin\AppData\Local\Temp\@AE7465.tmp.exe

          Filesize

          1.7MB

          MD5

          4c3d3118ad1dea55791321bebb03bb42

          SHA1

          2e154cd5a3bb81f6a37257488f9fc5e73496904e

          SHA256

          48ddf8c58db08ee2218c81098dce28290ce925580dd43764462effb60142cfb4

          SHA512

          c134bf36ff9ffb5e74cb508a19719d31b034038d28458cde4c803ee7a3bb80aedb6c6122ef023010f6b0305d2e549c78ec5e50f574563d5e521887f1eff8ac30

        • C:\Users\Admin\AppData\Local\Temp\tmp789B.tmp

          Filesize

          1.0MB

          MD5

          df2c63605573c2398d796370c11cb26c

          SHA1

          efba97e2184ba3941edb008fcc61d8873b2b1653

          SHA256

          07ffcde2097d0af67464907fec6a4079b92da11583013bae7d3313fa32312fe8

          SHA512

          d9726e33fcfa96415cc906bdb1b0e53eba674eaf30ed77d41d245c1c59aa53e222246f691d82fa3a45f049fbf23d441768f9da21370e489232770ad5ae91d32f

        • C:\Users\Admin\AppData\Local\Temp\tmp78AB.tmp

          Filesize

          229KB

          MD5

          6f90e1169d19dfde14d6f753f06c862b

          SHA1

          e9bca93c68d7df73d000f4a6e6eb73a343682ac5

          SHA256

          70a392389aecd0f58251e72c3fd7e9159f481061d14209ff8708a0fd9ff584dc

          SHA512

          f0c898222e9578c01ebe1befac27a3fb68d8fb6e76c7d1dec7a8572c1aa3201bacf1e69aa63859e95606790cf09962bcf7dc33b770a6846bed5bd7ded957b0b3

        • C:\Users\Admin\AppData\Local\Temp\tmp78BC.tmp

          Filesize

          120KB

          MD5

          f558c76b0376af9273717fa24d99ebbf

          SHA1

          f84bcece5c6138b62ef94e9d668cf26178ee14cc

          SHA256

          01631353726dc51bcea311dbc012572cf96775e516b1c79a2de572ef15954b7a

          SHA512

          2092d1e126d0420fec5fc0311d6b99762506563f4890e4049e48e2d87dde5ac3e2e2ecc986ab305de2c6ceb619f18879a69a815d3241ccf8140bc5ea00c6768d

        • C:\Users\Admin\AppData\Local\Temp\tmp78BD.tmp

          Filesize

          126KB

          MD5

          02ae22335713a8f6d6adf80bf418202b

          SHA1

          4c40c11f43df761b92a5745f85a799db7b389215

          SHA256

          ae5697f849fa48db6d3d13455c224fcf6ceb0602a1e8ac443e211dd0f32d50f4

          SHA512

          727d16102bfc768535b52a37e4e7b5d894f5daa268d220df108382c36dcce063afdbc31fd495a7a61305263ec4cd7e92713d894faa35b585c0b379217a1d929c

        • C:\Users\Admin\AppData\Local\Temp\tmp78BE.tmp

          Filesize

          89KB

          MD5

          09203a9741b91f3a9ed01c82dcb8778d

          SHA1

          13e6f3fb169cd6aa5e4d450417a7e15665a2e140

          SHA256

          63149ad45db380f5dd15f65d9ceb2611d53a0a66e022483bee4ce2ff7d2610e2

          SHA512

          9e9e6fe0dd713417d0e28ba787cf862d55ecda9ee9f3df1eada144657f6a3b6ada1984fd05a3fffcd597a9715383225a8e40b6e5d0d8d39ec0d3a64b8dea9846

        • C:\Users\Admin\AppData\Local\Temp\tmp78CF.tmp

          Filesize

          99KB

          MD5

          9a27bfb55dd768ae81ca8716db2da343

          SHA1

          55da0f4282bd838f72f435a5d4d24ac15b04482b

          SHA256

          5ec8093ef5939d1abce1c576097b584fb600b94ad767c1da897f7cb7f0063d26

          SHA512

          d9bb49d2f282ed09c351a1d8eb2540781e6a7fb39265473fd59d146bfc162f27a4ab1405301ed7395c12929a80551a399437d7d794d7ac48650e9037b60eb69c

        • C:\Users\Admin\AppData\Local\Temp\tmp78D0.tmp

          Filesize

          172KB

          MD5

          2634fa3a332c297711cb59d43f54ffce

          SHA1

          8e2b68d0ee4e792efb1945ba86eceb87f07087d2

          SHA256

          27c945ccb84aa024f1f063701327e829a7ef3a7ede4a43b2febbb1dddbdf8740

          SHA512

          84e4799b9b18a7cc7be685c793a9b4fb135ea331d1d235fe823e1d7091130f131ab2fbad1da4dea795e82547aa16b00f4e2a9faaa96cb522d795f9abfda2fc53

        • C:\Users\Admin\AppData\Local\Temp\tmp78E0.tmp

          Filesize

          276KB

          MD5

          e07c6a9e595f045fadc463dfda44ab16

          SHA1

          e6b199272ade02613f2003c365a4cb1487431e23

          SHA256

          d2fa6f9686386a92253a9c5ea25ace702a111483540b60c1300789235cea7fdc

          SHA512

          f3c630ae8381b99519aeeadbc2918810e7fb09a909f73ee6c46f4e9d3cf8c5051a5cf763db6a775d6cd8713ccf95a63b18df9ed756fa28276e8d7ab6a47f2cbf

        • C:\Users\Admin\AppData\Local\Temp\wtmps.exe

          Filesize

          276KB

          MD5

          75c1467042b38332d1ea0298f29fb592

          SHA1

          f92ea770c2ddb04cf0d20914578e4c482328f0f8

          SHA256

          3b20c853d4ca23240cd338b8cab16f1027c540ddfe9c4ffdca1624d2f923b373

          SHA512

          5c47c59ad222e2597ccdf2c100853c48f022e933f44c279154346eacf9e7e6f54214ada541d43a10424035f160b56131aab206c11512a9fd6ea614fbd3160aa0

        • C:\Users\Admin\AppData\Roaming\Microsoft\Defender\launch.exe

          Filesize

          172KB

          MD5

          daac1781c9d22f5743ade0cb41feaebf

          SHA1

          e2549eeeea42a6892b89d354498fcaa8ffd9cac4

          SHA256

          6a7093440420306cf7de53421a67af8a1094771e0aab9535acbd748d08ed766c

          SHA512

          190a7d5291e20002f996edf1e04456bfdff8b7b2f4ef113178bd42a9e5fd89fe6d410ae2c505de0358c4f53f9654ac1caaa8634665afa6d9691640dd4ee86160

        • C:\Users\Admin\AppData\Roaming\Microsoft\Messenger\Extension\WdExt.exe

          Filesize

          1.7MB

          MD5

          fba4aa2e736a92495d39cfa4604d02da

          SHA1

          11c9fb1fdd418abcb9f99b8b2b70c4377e45aa8f

          SHA256

          da0724113ff709bb79bfb8ef8d1dd62bd1cfdcfcd08e8093090148ca702f700e

          SHA512

          2e6d163154c7c6525397bdf9d6537db837b6ffd6b9a306747775275e144506116fd8ecf249c66b3633dd2b83ffae58111fb5ae906b626e4eac4b54685b2f16e5

        • C:\Users\Admin\AppData\Roaming\Temp\Admin0.bat

          Filesize

          129B

          MD5

          d1073c9b34d1bbd570928734aacff6a5

          SHA1

          78714e24e88d50e0da8da9d303bec65b2ee6d903

          SHA256

          b3c704b1a728004fc5e25899d72930a7466d7628dd6ddd795b3000897dfa4020

          SHA512

          4f2b9330e30fcc55245dc5d12311e105b2b2b9d607fbfc4a203c69a740006f0af58d6a01e2da284575a897528da71a2e61a7321034755b78feb646c8dd12347f

        • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

          Filesize

          126B

          MD5

          91b488adfb1e5183ac597f86ca506e47

          SHA1

          d12239d6c3b35d148f9470286fd4be3e35847ae8

          SHA256

          e58addbeca5877640cfa79f7786796c6b9af1ea6896e9cda5be9d70045906184

          SHA512

          fcb8e6a2c259d0cb6ca08aaa71690ff60e02a5b14bb410a2a89780748bebd6984f33370f6402e7c638b6e75547972b1d88bc52d744969ff64028de5251f1042f

        • C:\Users\Admin\AppData\Roaming\Temp\Admin1.bat

          Filesize

          196B

          MD5

          9c56412c3cc17b8f15a92f3cefbbf6b8

          SHA1

          7a2cb1e75403407a2c4c9134c4a5b1fdf70f20e8

          SHA256

          733d12d85807248bec6e19665c60709e5fe6b02d9209b84d686cd180a9bb7f4f

          SHA512

          09c494402133bd4acda6c1529e79237e5b41cc87e3995c55cd9c9251fb1022cd0617ef2da395fa5f97a65aace6c6adabd0c33f909aa674b4b4c07ab1678d7717

        • C:\Users\Admin\AppData\Roaming\Temp\Admin2.bat

          Filesize

          102B

          MD5

          3ca08f080a7a28416774d80552d4aa08

          SHA1

          0b5f0ba641204b27adac4140fd45dce4390dbf24

          SHA256

          4e7d460b8dc9f2c01b4c5a16fb956aced10127bc940e8039a80c6455901ea1f0

          SHA512

          0c64aa462ff70473ef763ec392296fe0ea59b5340c26978531a416732bc3845adf9ca7b673cb7b4ba40cc45674351206096995c43600fccbbbe64e51b6019f01

        • C:\Users\Admin\AppData\Roaming\Temp\mydll.dll

          Filesize

          388KB

          MD5

          8d7db101a7211fe3309dc4dc8cf2dd0a

          SHA1

          6c2781eadf53b3742d16dab2f164baf813f7ac85

          SHA256

          93db7c9699594caa19490280842fbebec3877278c92128b92e63d75fcd01397a

          SHA512

          8b139d447068519997f7bbc2c7c2fe3846b89ae1fba847258277c9ab92a93583b28fae7ffa444768929ed5852cc914c0270446cbf0bd20aca49bde6b6f809c83

        • C:\Windows\SysWOW64\mscaps.exe

          Filesize

          200KB

          MD5

          78d3c8705f8baf7d34e6a6737d1cfa18

          SHA1

          9f09e248a29311dbeefae9d85937b13da042a010

          SHA256

          2c4c9ec8e9291ba5c73f641af2e0c3e1bbd257ac40d9fb9d3faab7cebc978905

          SHA512

          9a3c3175276da58f1bc8d1138e63238c8d8ccfbfa1a8a1338e88525eca47f8d745158bb34396b7c3f25e4296be5f45a71781da33ad0bbdf7ad88a9c305b85609

        • memory/4676-17-0x0000000010000000-0x0000000010015000-memory.dmp

          Filesize

          84KB