Analysis

  • max time kernel
    119s
  • max time network
    103s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 05:26

General

  • Target

    3b79514bd6363e670f982a9f55daa070N.exe

  • Size

    179KB

  • MD5

    3b79514bd6363e670f982a9f55daa070

  • SHA1

    1dc003d4c75e13ff325dee8161e97011792141a4

  • SHA256

    c46400e9c40c1a5e68fe2b148e716f09448ed0626072129db27e766192d33bb9

  • SHA512

    27c1d44fa34bd252fdf548d5f43640ba7cfb32ff94efd514a6d2b7e18e0049dd5db102bbb37154c73cc87961f98bcdec23e1840a0e09e1f01fe5580f54110bc6

  • SSDEEP

    3072:DXTTASJKf2n5AxE2NpxOa2XdU2QF4s5XgIDFyHb8kHofL/09rGB:DvASJKenie2xT2NU2OTFQb8Fb0IB

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Checks for any installed AV software in registry 1 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3b79514bd6363e670f982a9f55daa070N.exe
    "C:\Users\Admin\AppData\Local\Temp\3b79514bd6363e670f982a9f55daa070N.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4192
    • C:\Windows\SysWOW64\svchost.exe
      C:\ProgramData\24b2bbbb08.exe
      2⤵
      • Adds Run key to start application
      • Checks for any installed AV software in registry
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2712
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\ProgramData\lybFACA.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\3b79514bd6363e670f982a9f55daa070N.exe""
      2⤵
      • System Location Discovery: System Language Discovery
      PID:3292

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\lybFACA.tmp.bat

    Filesize

    33B

    MD5

    49192068b246b2e124d9aea5c0da8e19

    SHA1

    49afaf96c4d383ba87bd07e2392e6cb142aebd1d

    SHA256

    4a8ece4bb72373ec39e2e32184bfd1b355f488049def5ffc0c188915d7a4e6ec

    SHA512

    59e9ab56c044f8c7aa496950ce73431b5475e1c858960b46cb4ba711a2be02e79a7d03edcf5f8d18baa467abbe56b3f950463fc823f370894795a6d33997f4e3

  • memory/2712-293-0x0000000000B50000-0x0000000000BC6000-memory.dmp

    Filesize

    472KB

  • memory/2712-2-0x0000000000340000-0x0000000000341000-memory.dmp

    Filesize

    4KB

  • memory/2712-281-0x0000000000B50000-0x0000000000BC6000-memory.dmp

    Filesize

    472KB

  • memory/2712-284-0x0000000000B50000-0x0000000000BC6000-memory.dmp

    Filesize

    472KB

  • memory/2712-285-0x0000000000800000-0x0000000000A00000-memory.dmp

    Filesize

    2.0MB

  • memory/2712-287-0x0000000000B50000-0x0000000000BC6000-memory.dmp

    Filesize

    472KB

  • memory/2712-290-0x0000000000B50000-0x0000000000BC6000-memory.dmp

    Filesize

    472KB

  • memory/2712-499-0x0000000000800000-0x0000000000A00000-memory.dmp

    Filesize

    2.0MB

  • memory/2712-3-0x0000000000B50000-0x0000000000BC6000-memory.dmp

    Filesize

    472KB

  • memory/2712-310-0x0000000000B50000-0x0000000000BC6000-memory.dmp

    Filesize

    472KB

  • memory/2712-304-0x0000000000800000-0x0000000000A00000-memory.dmp

    Filesize

    2.0MB

  • memory/2712-286-0x0000000000B50000-0x0000000000BC6000-memory.dmp

    Filesize

    472KB

  • memory/2712-498-0x0000000000800000-0x0000000000A00000-memory.dmp

    Filesize

    2.0MB

  • memory/2712-492-0x0000000000B50000-0x0000000000BC6000-memory.dmp

    Filesize

    472KB

  • memory/2712-478-0x0000000000B50000-0x0000000000BC6000-memory.dmp

    Filesize

    472KB

  • memory/4192-475-0x0000000000960000-0x0000000000990000-memory.dmp

    Filesize

    192KB

  • memory/4192-474-0x00000000033B0000-0x0000000003426000-memory.dmp

    Filesize

    472KB

  • memory/4192-0-0x0000000000960000-0x0000000000990000-memory.dmp

    Filesize

    192KB