Analysis

  • max time kernel
    124s
  • max time network
    129s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-09-2024 09:42

General

  • Target

    d469101177f6bf36c38755988485c255e2918304ad51d30b5ed76062a4e46382.exe

  • Size

    159KB

  • MD5

    70e0ec444e51ea02174ec13c02a9fb26

  • SHA1

    69ece913a8597d55722bad0f3c311da368923c6b

  • SHA256

    d469101177f6bf36c38755988485c255e2918304ad51d30b5ed76062a4e46382

  • SHA512

    e018598c1c0728ba81c5fea4c4f36864f195643d82236859ecb5031752df368b3eea81bb675a7784b2a0c7c537f65f0d7d1adccad4424433d757eee318b623fb

  • SSDEEP

    3072:xkY4k28GEHx1UG2c0IsWnR3FPy+3ZiA/kIKeI6+zCPLBNecbPdB+XGSlZ51Jd4+X:x3U8GER27c0ArBl/E6o4LBNecUeul

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 11 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • Suspicious use of AdjustPrivilegeToken 43 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d469101177f6bf36c38755988485c255e2918304ad51d30b5ed76062a4e46382.exe
    "C:\Users\Admin\AppData\Local\Temp\d469101177f6bf36c38755988485c255e2918304ad51d30b5ed76062a4e46382.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:436
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c whoami
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3920
      • C:\Windows\SysWOW64\whoami.exe
        whoami
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:4932
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ipconfig /all
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1828
      • C:\Windows\SysWOW64\ipconfig.exe
        ipconfig /all
        3⤵
        • System Location Discovery: System Language Discovery
        • Gathers network information
        PID:4512
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c echo %USERPROFILE%\Desktop
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4412
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c wmic diskdrive get serialnumber
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4284
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic diskdrive get serialnumber
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:2156
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c systeminfo
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4024
      • C:\Windows\SysWOW64\systeminfo.exe
        systeminfo
        3⤵
        • System Location Discovery: System Language Discovery
        • Gathers system information
        PID:768
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c dir C:\Users\Admin\\Desktop
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2996
  • C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
    "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4444,i,6510295916244954942,10164894160290787457,262144 --variations-seed-version --mojo-platform-channel-handle=4112 /prefetch:8
    1⤵
      PID:3624

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads