Analysis
-
max time kernel
1795s -
max time network
1799s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/09/2024, 05:48
Static task
static1
Behavioral task
behavioral1
Sample
Cleanup_Basic.exe
Resource
win10v2004-20240802-en
General
-
Target
Cleanup_Basic.exe
-
Size
214KB
-
MD5
6a44af6eda4462171d04c33051cd6b20
-
SHA1
e4b5842957c198be01d7b6826c2ae1f425d78746
-
SHA256
551d146b6e1d7861a5b211597ebdbbb2e1f16021386c382954dc7b322b6ad0a5
-
SHA512
6842b59bf97e5b41dfd61d297081f8505cf27a562452c71da8ddd3aed5838ccc575980cd1233d32aec242f751e2c5a3689935e9942bd818cce0aab51ca110eb3
-
SSDEEP
3072:KQLWOnFiCnkIDSrySPnhl0Cj/irN833f+y7bQ6wvCIWf2JjBX+Zfzp8/Hkbl71RR:nACTD4Pbn3f+yfwKIW+fcfzO/o71RUK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation Cleanup_Basic.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\PDDOM~1.API cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\UPDATE~1.API cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\AXE8SH~1.DLL cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\COMMEN~1.AAP cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\DigSig.api cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\EDIT_R~2.AAP cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\INFO~1.PLI cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\JP2KLib.dll cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\B61D15~1\5664~1.878\FILECO~1 cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\READOU~1.API cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\TURKISH.TXT cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\1926E8~1\100~1.402\F_31C8~1 cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\ACE~1.DLL cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\AcroRd32.dll cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\adoberfp.dll cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\DISPLA~2.T cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\MAKEAC~1.API cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\1926E8~1\100~1.402\F_785C~1 cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\1D5E3C~1\100~1.402\F_9827~1 cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\DISPLA~1.EN_ cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\drvDX9.x3d cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\DVA.api cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\ACROBR~1.EXE cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\Acrofx32.dll cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\adobepdf.xdc cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\ADOBEP~1.PMP cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\eBook.api cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\_d.x3d cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\EDIT_R~1.AAP cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\ViewerPS.dll cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\1926E8~1\100~1.402\F_77A9~1 cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\CACHES~1.TXT cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\1926E8~1\100~1.402\F_A206~1 cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\1926E8~1\100~1.402\F_9587~1 cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\ADOBEA~1.BDC cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\QUICKT~1.MPP cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\SendMail.api cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\weblink.api cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\CP1252~1.TXT cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\eula.exe cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\LIBCEF~1.15E cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\REFLOW~1.API cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\1D5E3C~1\100~1.402\F_AE83~1 cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\ACRORD~1.DLL cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\ahclient.dll cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\ccme_ecc.dll cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\dummy.dic cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\ROMANIAN.TXT cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\SYMBOL.TXT cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\000061~2\160~1.125\MSVCP1~3.DLL cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\1926E8~1\100~1.402\F_727A~1 cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\1D5E3C~1\100~1.402\F_CENT~1 cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\1D5E3C~1\100~1.402\F_CENT~4 cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\ACROFO~1.API cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\DATAMA~1.PMP cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\_difr.x3d cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\1926E8~1\100~1.402\F_CENT~3 cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\ACROCE~1.15E cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\ACROPD~1.DLL cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\ADOBEC~1.EXE cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\EScript.api cmd.exe File opened for modification C:\Windows\Prefetch\READYB~1\READYB~1.ETL cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\NPPDF3~1.DLL cmd.exe File opened for modification C:\Windows\Installer\$PatchCache$\Managed\68AB67~1\157~1.200\Spelling.api cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cleanup_Basic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cleanup_Basic.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeRestorePrivilege 2604 7zG.exe Token: 35 2604 7zG.exe Token: SeSecurityPrivilege 2604 7zG.exe Token: SeSecurityPrivilege 2604 7zG.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 7zG.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4692 wrote to memory of 4504 4692 Cleanup_Basic.exe 104 PID 4692 wrote to memory of 4504 4692 Cleanup_Basic.exe 104 PID 4692 wrote to memory of 4504 4692 Cleanup_Basic.exe 104 PID 4692 wrote to memory of 4312 4692 Cleanup_Basic.exe 107 PID 4692 wrote to memory of 4312 4692 Cleanup_Basic.exe 107 PID 4692 wrote to memory of 4312 4692 Cleanup_Basic.exe 107 PID 4692 wrote to memory of 1396 4692 Cleanup_Basic.exe 109 PID 4692 wrote to memory of 1396 4692 Cleanup_Basic.exe 109 PID 4692 wrote to memory of 1396 4692 Cleanup_Basic.exe 109 PID 4692 wrote to memory of 1132 4692 Cleanup_Basic.exe 111 PID 4692 wrote to memory of 1132 4692 Cleanup_Basic.exe 111 PID 4692 wrote to memory of 1132 4692 Cleanup_Basic.exe 111 PID 4692 wrote to memory of 4364 4692 Cleanup_Basic.exe 113 PID 4692 wrote to memory of 4364 4692 Cleanup_Basic.exe 113 PID 4692 wrote to memory of 4364 4692 Cleanup_Basic.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\Cleanup_Basic.exe"C:\Users\Admin\AppData\Local\Temp\Cleanup_Basic.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\7.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4504
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\PATCHES_TEMP.bat" "2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4312
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\Recycle.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1396
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\User_Internet_Temp.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:1132
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\User_Temp.bat" "2⤵
- System Location Discovery: System Language Discovery
PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1304,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=4252 /prefetch:81⤵PID:1460
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Cleanup_Basic.exe"C:\Users\Admin\AppData\Local\Temp\Cleanup_Basic.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2984
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\AppData\Local\Temp\Cleanup_Basic\" -spe -an -ai#7zMap724:106:7zEvent306481⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2604
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Cleanup_Basic\7.bat" "1⤵PID:4156
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Cleanup_Basic\PATCHES_TEMP.bat" "1⤵
- Drops file in Windows directory
PID:3940
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Cleanup_Basic\Recycle.bat" "1⤵PID:4444
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Cleanup_Basic\User_Internet_Temp.bat" "1⤵PID:3264
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Cleanup_Basic\User_Temp.bat" "1⤵PID:1892
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=1424,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=4372 /prefetch:81⤵PID:3952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
107B
MD57b7224abcf6313804abfa2175103cb41
SHA148be432bc01ba5bf00a41fcd958c3968ea67acbf
SHA2569b6b202deb60806df3e0f23225004a39ccc9fa912dc7630ba0c526fe27583ba4
SHA512f77bf46dbdfce4ea8a2497af60abbfa477258d523661d23e802995254b1f5af24524a9d121ede8362894a64e60f9b5f5d20b2b400f587165217e021a22396584
-
Filesize
178B
MD50bf8d1e229e23ab88ebe5d0bf9e2a614
SHA14d29b802ddda9c3d9503bf5b846e33c31d295a85
SHA256bc6f2e2411324af18ba011c5a242f1c3f727f1c1facdedc2a9418eaf6d88d7a9
SHA512e41eb1c5c6cf8447a6455585d6c1973cc9198af9a4e03ca8d0d338b7bb1100bb3f6490addee0697fa16d95002bbb78bb9e37e33477d591229e35cbd6ff1391af
-
Filesize
48B
MD55dbfbb0b57bccb73b2c565b021ff0197
SHA186c3398c53b2bb20322d250209eabf00afa05170
SHA256e5b393488f7dadf66aaa8fa99d7881b13f038381af70fcd6567e57b83fcb8814
SHA5122133129eab464ca9274949f541fd80b0c98ecdd2634d590ffb83662630f1644d873c56ebd5fd9466784e00e3de18eb00fe942aec0319a8066552d92c10164a8c
-
Filesize
316B
MD5b341a04e612e6ed2bdfb11e7d1a9a4e5
SHA1a4ff52251c0750cef4d19f9a0e5f8130da881d03
SHA256fd137fb82fdd2aee8e4887b0ff20cb209f8c67edba4042e69c9f3a78f6e83103
SHA512e9e8e7d846dd3fbf6bb17a64de39eeb50c968799e968d8f11bd38e45664d8cb45ec4ee52842185507fb67707ca9d7c8bed43d488f7f343ded12eac6ae94d4f74
-
Filesize
231B
MD53dfa9a05b23c2205676b887ec654218e
SHA145059be952c84fbfa075823155789448e5613ec5
SHA256d51cfe301aa00cd3b7b0accee8c6a7a454087f206594e7d0e7ec083056a7eb30
SHA512e2d9120d694acd02d4c5679fc1b9d9c4ce020a009d08f42330c1c05b88f2c997684d91fd28242c48bde9e882fe101587e6b2768067acd2195bbfbf8c792918ea