Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/08/2024, 19:56

General

  • Target

    2dcaba19427bafb69dbb96b35f2f307623cad8e80316fb709031b2d399a76ca8.exe

  • Size

    511KB

  • MD5

    fa013e09d8416db8ff91b1c40571b863

  • SHA1

    08cd812dad30d509dcb7af8e0c307410d84ceb39

  • SHA256

    2dcaba19427bafb69dbb96b35f2f307623cad8e80316fb709031b2d399a76ca8

  • SHA512

    d133f8d8190b753d9c79371a2bcaf518a8f77c8b33e4b8d682b594c6800287d477b4bc2c1b1225847834c763d51a0284ced1c1be26c47fe6ce16ea8b6d4c7bdc

  • SSDEEP

    12288:H0lc87eqqV5e+wBV6O+RjAES+yYsarw/2FQkC0TjC8ltlp4:H0SqqHeVBxkhSFND/jkZTjhltlp4

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of UnmapMainImage
    PID:3604
    • C:\Users\Admin\AppData\Local\Temp\2dcaba19427bafb69dbb96b35f2f307623cad8e80316fb709031b2d399a76ca8.exe
      "C:\Users\Admin\AppData\Local\Temp\2dcaba19427bafb69dbb96b35f2f307623cad8e80316fb709031b2d399a76ca8.exe"
      2⤵
      • Adds Run key to start application
      • Drops file in System32 directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1128
      • C:\Users\Admin\AppData\Roaming\Checfc\doskdump.exe
        "C:\Users\Admin\AppData\Roaming\Checfc"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1372
        • C:\Users\Admin\AppData\Local\Temp\~C340.tmp
          3604 523272 1372 1
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1680
  • C:\Windows\SysWOW64\mtstdown.exe
    C:\Windows\SysWOW64\mtstdown.exe -s
    1⤵
    • Executes dropped EXE
    • System Location Discovery: System Language Discovery
    PID:5032

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\~C340.tmp

          Filesize

          8KB

          MD5

          86dc243576cf5c7445451af37631eea9

          SHA1

          99a81c47c4c02f32c0ab456bfa23c306c7a09bf9

          SHA256

          25d2a671e1b5b5b95697ac0234ce4d46e0d0894919521b54aabebd9daecf994a

          SHA512

          c7310524f9b65f811146c1eb6ae944966351ac88a95fbc1ac422d8810730e5e212a7e28090ad758ea23c96ba38073e7fcf42460575e7f09dbc759a45c5d5a4a4

        • C:\Users\Admin\AppData\Roaming\Checfc\doskdump.exe

          Filesize

          511KB

          MD5

          af55d14c5da18aff7cdadfb8b53dc581

          SHA1

          4889e701588390a6a42cc18391bb8c4a1d61d365

          SHA256

          bef97d62c6a91f0ba58b16156829475e898858cc049f3d127a1cb3afe20f15b7

          SHA512

          72e34f73e04a430e03dff9eee17ee07ffe28433faafc1bee6131297793649830caa19a8527354bd0f8e4313b9ded722e426304a203a57bd881a3cfa9e1392af7

        • memory/1128-1-0x00000000007D0000-0x0000000000858000-memory.dmp

          Filesize

          544KB

        • memory/1128-28-0x0000000000400000-0x000000000048A000-memory.dmp

          Filesize

          552KB

        • memory/1128-0-0x0000000000400000-0x000000000048A000-memory.dmp

          Filesize

          552KB

        • memory/1372-8-0x0000000000400000-0x000000000048A000-memory.dmp

          Filesize

          552KB

        • memory/1372-10-0x00000000006F0000-0x0000000000778000-memory.dmp

          Filesize

          544KB

        • memory/1372-11-0x0000000000A80000-0x0000000000A85000-memory.dmp

          Filesize

          20KB

        • memory/3604-25-0x0000000002F80000-0x000000000300F000-memory.dmp

          Filesize

          572KB

        • memory/3604-16-0x0000000002F80000-0x000000000300F000-memory.dmp

          Filesize

          572KB

        • memory/3604-26-0x0000000002990000-0x0000000002996000-memory.dmp

          Filesize

          24KB

        • memory/3604-27-0x00000000030D0000-0x00000000030DD000-memory.dmp

          Filesize

          52KB

        • memory/5032-23-0x0000000000400000-0x000000000048A000-memory.dmp

          Filesize

          552KB

        • memory/5032-24-0x00000000007B0000-0x0000000000838000-memory.dmp

          Filesize

          544KB