Analysis

  • max time kernel
    119s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/08/2024, 17:37

General

  • Target

    78a77307fe3eff59ea67b16f08ee8090N.exe

  • Size

    2.4MB

  • MD5

    78a77307fe3eff59ea67b16f08ee8090

  • SHA1

    fa3735cf7128fed95e7c399bdd553ac95b1f254e

  • SHA256

    dea2e72f1394e078380e44dcca7cab125b5589075f3c6345b46f9202fe5f2f15

  • SHA512

    afd5ec8b61dd52672c9d84cd304ad8f3745c45d0625bfdde5ea43d3f272aada3dbff5e03d88029cc1df93c6999a44bc36236cb48a38e01c88a0fe82bee129292

  • SSDEEP

    49152:5Ko2gzhGqxIaWeSkKkAQOQ1y7GklXRYxxTttMs+xyPFRwGJnunLp9u0XsA5cl+6s:I+zhGqx3WeSkKkAQOQ1y7PlXRYxxTtt+

Malware Config

Signatures

  • Modifies firewall policy service 3 TTPs 10 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 3 IoCs
  • UPX packed file 23 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 14 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry key 1 TTPs 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 36 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 49 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\78a77307fe3eff59ea67b16f08ee8090N.exe
    "C:\Users\Admin\AppData\Local\Temp\78a77307fe3eff59ea67b16f08ee8090N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2016
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\EDnlk.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1848
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Java(TM) Platform SE Auto Updator 2.1" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Java\uninstall.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2352
    • C:\Users\Admin\AppData\Roaming\Java\uninstall.exe
      "C:\Users\Admin\AppData\Roaming\Java\uninstall.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Users\Admin\AppData\Roaming\Java\uninstall.exe
        C:\Users\Admin\AppData\Roaming\Java\uninstall.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4524
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2100
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2292
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Java\uninstall.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Java\uninstall.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3476
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Java\uninstall.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Java\uninstall.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:2284
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1136
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:1316
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Falaheye.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Falaheye.exe:*:Enabled:Windows Messanger" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4892
          • C:\Windows\SysWOW64\reg.exe
            REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Falaheye.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Falaheye.exe:*:Enabled:Windows Messanger" /f
            5⤵
            • Modifies firewall policy service
            • System Location Discovery: System Language Discovery
            • Modifies registry key
            PID:1048
      • C:\Users\Admin\AppData\Roaming\Java\uninstall.exe
        C:\Users\Admin\AppData\Roaming\Java\uninstall.exe
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2468

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\EDnlk.txt

    Filesize

    173B

    MD5

    0f9512ff58185a551abc4fa80ffde3b5

    SHA1

    eb2df1adbb3504236d2857d8a9c297121c97a95d

    SHA256

    79747cbd0b884c6870d0ab8b90e4b64af598f1c1c97b2eb31c1fc1a1d6128189

    SHA512

    1f7216ce7cd2e1ae6e30c7d6d0f84b3a7a637c6cfe9568a10ffa802b99a832b3e4f45c7bd02cbbe70665e79ea917e7e9ac9a38ceaf469836fb207a47ef52ff3e

  • C:\Users\Admin\AppData\Roaming\Java\uninstall.txt

    Filesize

    2.4MB

    MD5

    89b30ddad298504c84bf0c922187fad6

    SHA1

    ccc3c1e20aa0d39d687b355c3128248dbe6d662d

    SHA256

    c5cbb589aaa7d28547065d36b07e9692f83ef5d0ed1ebb613c24e0f35ffa830b

    SHA512

    0dc4237a577dae0a52de879058d7e25bfa90f61391bb9e3b46f1440b5d4755d8adf7f0f782a61acd398c869d31a56e5f41163317925bc98c24f1e9911ef4b2a1

  • memory/2016-31-0x0000000000400000-0x000000000065F000-memory.dmp

    Filesize

    2.4MB

  • memory/2016-0-0x0000000000400000-0x000000000065F000-memory.dmp

    Filesize

    2.4MB

  • memory/2272-28-0x0000000000400000-0x000000000065F000-memory.dmp

    Filesize

    2.4MB

  • memory/2272-49-0x0000000000400000-0x000000000065F000-memory.dmp

    Filesize

    2.4MB

  • memory/2468-45-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2468-54-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2468-37-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/2468-42-0x0000000000400000-0x0000000000409000-memory.dmp

    Filesize

    36KB

  • memory/4524-52-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4524-62-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4524-35-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4524-53-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4524-32-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4524-57-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4524-60-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4524-38-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4524-64-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4524-67-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4524-69-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4524-71-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4524-76-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4524-78-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB