Analysis

  • max time kernel
    135s
  • max time network
    127s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/08/2024, 11:28

General

  • Target

    Funshion.exe

  • Size

    1.7MB

  • MD5

    0889eadfa78e56af137084e249106520

  • SHA1

    61d4cae62622cb2beb3784eff3a626969fbbd624

  • SHA256

    1ea323d3769374766a916308ab53be755897c2541e3b80f83f180d3831ad6d01

  • SHA512

    cd11e8c60e9de9c69b144c4cdf0e168c31e85f4eacbdbf0cef806a19c236e8ff412768c5d6d6d2f216940165bf56e5919e0cb56741c604f4f1fa19a15f7ce920

  • SSDEEP

    24576:2hPZDb6pqEvfVpgoJkrN2K2Tl0VjddeY/LeMadbawrdviBPKf2P+pjF:2WrnHgoWxI0N6YjeMEf2P+pF

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 9 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies registry class 51 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 21 IoCs
  • Suspicious use of SendNotifyMessage 21 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Funshion.exe
    "C:\Users\Admin\AppData\Local\Temp\Funshion.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2292
    • C:\Users\Admin\AppData\Local\Temp\FunshionService.exe
      "C:\Users\Admin\AppData\Local\Temp\FunshionService.exe" UISTARTFSPSERVER
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Windows\SysWOW64\dxdiag.exe
        dxdiag.exe /whql:off /t C:\Users\Admin\funshion\fsdxdiag.txt
        3⤵
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Checks SCSI registry key(s)
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of SetWindowsHookEx
        PID:3240
      • C:\Windows\SysWOW64\tracert.exe
        tracert.exe -d -h 16 -w 800 209.131.36.158
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        PID:1316
    • C:\Users\Admin\AppData\Local\Temp\XPSP2Patch\evid4226-vc80-mt.exe
      --silent
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4432

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\funshion.ini

    Filesize

    129B

    MD5

    a97cabe36194a10ea1e59dcbab1ec575

    SHA1

    59ddf34eefc3214514845945bbb33cb48dd5f7ab

    SHA256

    41230d95c4b728cba2c96612603063b61aba177fa6c53bd3af5c6226806d5b54

    SHA512

    8450ff4b8bf95f2248a861bd0deb23833b5582c7ea6d8fdfa507204733f19c914b821a72d9cbdf0bf56dbe3e49fde05f31d5fcd9e8c7412074b8a847ae2d2ce6

  • C:\Users\Admin\AppData\Local\Temp\funshion.ini

    Filesize

    153B

    MD5

    5ea101dbdea64d0e6987794b28bbded0

    SHA1

    d8e866f1fe22dc2eddec064dcdbeb0fbaf4a0ac6

    SHA256

    00189fd386355b5f1bd6d3f8b60182d76ec5d681bd5582a5fb5451a7605eb94c

    SHA512

    ae8b6361b3bf80b64ece05e20e4a99442a6701c29014849949b559ecdc545536dfc626fe6fb853fbc8feee615578fc80cb8218ffc30def534d116b261b1e3bfc

  • C:\Users\Admin\FunShion.ini

    Filesize

    257B

    MD5

    7599a937447942fadd46ea9142932fe5

    SHA1

    6081ee88c95b0782d20112f9a337ea25aab643bd

    SHA256

    e557e480e17e7f70b44bcebd6c60958468de6eed50c3aa267b08d13365378452

    SHA512

    96e801fc5a867d7eac02f14ce4659db8d159eb647d5121c654f000c1e8449279bc0ed9810194916c5d554feea7e3a0c855ed8477c3d656537ad1ff7a0c9e5f0d

  • C:\Users\Admin\FunShion.ini

    Filesize

    257B

    MD5

    43a8a4db62b5216eac19fcc3ed63c966

    SHA1

    c37161bc287db47497ef6603128d11345fe63b50

    SHA256

    d996cf7c1ebb83e85029d3f3dfd897a5af01af79d07d7390ee40e950032965d8

    SHA512

    e2341dddd9b53d01f70f58406e2a7fae0fc77cfd2c9097fc2058a34c81e41d7884fec4910d65fd52af65f792fd247e1125f93db2aeb9448cb714442ff56fb3d2

  • C:\Users\Admin\FunShion.ini

    Filesize

    212B

    MD5

    208b8d3b66c05a4c969fcdb13d014754

    SHA1

    3888da51d785bb7d4d463f82c8cd5b0ba21fb69b

    SHA256

    0cc73a5a673b84ee53718f7b32004aa40eca3bb7189bd041a73b6bb93ed73b93

    SHA512

    9bc8a604eeed55e698965e68df28e33c6389ffb86aae0d963b2d566b8b1d52bf37eb976ce28fde7df066d528b628f55a3514aa3996ecd33a20a2682b306e74d9

  • memory/1788-229-0x0000000003B40000-0x0000000003B6B000-memory.dmp

    Filesize

    172KB

  • memory/1788-16-0x0000000000820000-0x000000000084E000-memory.dmp

    Filesize

    184KB

  • memory/1788-15-0x0000000000800000-0x000000000081C000-memory.dmp

    Filesize

    112KB

  • memory/2292-199-0x0000000006490000-0x0000000006579000-memory.dmp

    Filesize

    932KB

  • memory/2292-259-0x00000000030E0000-0x00000000030E1000-memory.dmp

    Filesize

    4KB

  • memory/2292-0-0x00000000030E0000-0x00000000030E1000-memory.dmp

    Filesize

    4KB

  • memory/2292-2-0x0000000003560000-0x000000000357B000-memory.dmp

    Filesize

    108KB

  • memory/3240-232-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3240-243-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3240-242-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3240-241-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3240-240-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3240-239-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3240-238-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3240-244-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3240-234-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB

  • memory/3240-233-0x0000000000C80000-0x0000000000C81000-memory.dmp

    Filesize

    4KB