Analysis

  • max time kernel
    149s
  • max time network
    124s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/08/2024, 06:45

General

  • Target

    e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.exe

  • Size

    2.0MB

  • MD5

    0fa75e9407747ae697433ec5d5f732bb

  • SHA1

    1ef9328053fae90b015cbbf31a693ec1bfbbd0d1

  • SHA256

    e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5

  • SHA512

    4b6ef2e974d3fe19ac8cc6d2ecf888edda6dac772ad74ce68edab39a93dba5b5387c95663df7da1bf2399b7cce92fce48a331812872ba9664088f301f9d1a76e

  • SSDEEP

    49152:r+CQS88KQUnnhs3YMuQIIUf3MaoOTNz5DZb5YRtLLy+z:6S8jQIq3YML+FoOTNVZtYRt3y

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 1 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of SetWindowsHookEx 10 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.exe
    "C:\Users\Admin\AppData\Local\Temp\e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Users\Admin\AppData\Local\Temp\6784.tmp
      "C:\Users\Admin\AppData\Local\Temp\6784.tmp" --pingC:\Users\Admin\AppData\Local\Temp\e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.exe C36D17C8B656943A8264773AE318A51102C0099DDBEF38C411B1CCD5F971FA970319A6CCCEE5467690981A3EDF09D069AA1186FCF1C8063894FCDCDBE79DC127
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • System Network Configuration Discovery: Internet Connection Discovery
      • Modifies registry class
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE
        "C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.docx" /o ""
        3⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious behavior: AddClipboardFormatListener
        • Suspicious use of SetWindowsHookEx
        PID:208

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\6784.tmp

          Filesize

          2.0MB

          MD5

          1757d346d73505b1e0fc45419510bed2

          SHA1

          666869a9564901ae05c9e83fd5574433d9ce1b4f

          SHA256

          c4b4891796cdbd74ab999556638c173b751f2eff0007c74ba8dc88e97e2492c9

          SHA512

          8d715e4c7e56b6eec6bad422249bd1a54dfaa8ada9db4d05a97ef67728d5c83a6b14bdb4c74201bf1d8d15344231bddfcf8f67180c0ab5316f9f79fe1fa5ad95

        • C:\Users\Admin\AppData\Local\Temp\e9851a1308c94d3662e2cf5b7086679aefb2a63d6454459cfceb033585d12be5.docx

          Filesize

          21KB

          MD5

          e4098a63fecda5bb888f9714395acbc6

          SHA1

          0873005b98c70398e067eedf265a91214aca400e

          SHA256

          acbc1966b31286bfa107541100ba4075af342a12bcbee0baecfbdad941e73fa6

          SHA512

          64299baf51ffa5fc0fed933f1ee02dbb23b6ca9c8081be122462f3de3dffb74e2c103876e449a193689765bcd504aa1b2f798972112aae73bcfab14eb62e9322

        • memory/208-9-0x00007FFBAEFF0000-0x00007FFBAF000000-memory.dmp

          Filesize

          64KB

        • memory/208-12-0x00007FFBAEFF0000-0x00007FFBAF000000-memory.dmp

          Filesize

          64KB

        • memory/208-10-0x00007FFBEF00D000-0x00007FFBEF00E000-memory.dmp

          Filesize

          4KB

        • memory/208-11-0x00007FFBAEFF0000-0x00007FFBAF000000-memory.dmp

          Filesize

          64KB

        • memory/208-13-0x00007FFBAEFF0000-0x00007FFBAF000000-memory.dmp

          Filesize

          64KB

        • memory/208-18-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-17-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-16-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-20-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-19-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-15-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-21-0x00007FFBACEF0000-0x00007FFBACF00000-memory.dmp

          Filesize

          64KB

        • memory/208-22-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-14-0x00007FFBAEFF0000-0x00007FFBAF000000-memory.dmp

          Filesize

          64KB

        • memory/208-24-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-27-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-31-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-32-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-30-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-29-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-28-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-26-0x00007FFBACEF0000-0x00007FFBACF00000-memory.dmp

          Filesize

          64KB

        • memory/208-25-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-23-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-47-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-49-0x00007FFBEEF70000-0x00007FFBEF165000-memory.dmp

          Filesize

          2.0MB

        • memory/208-48-0x00007FFBEF00D000-0x00007FFBEF00E000-memory.dmp

          Filesize

          4KB