Analysis

  • max time kernel
    54s
  • max time network
    61s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/09/2024, 19:50

General

  • Target

    54eb180e8eaa667b82be723066f29b14456b00d8a69c100d56f9a530398fba85.exe

  • Size

    635KB

  • MD5

    bfd012c5ae9040bdc2c112884595101b

  • SHA1

    c76b34ef2786272260efd531deb8f64dca040a32

  • SHA256

    54eb180e8eaa667b82be723066f29b14456b00d8a69c100d56f9a530398fba85

  • SHA512

    3760f43b7074cd237c8e90084796a599579e2ae0e74a9dd534ac072b94c7b67721b5efc013677cd13c9b987afbb246c814841d35905b83889399b5f4efdc3619

  • SSDEEP

    6144:fBDHmrz4niNy8o3Zp/TWt+g4RQTDUBO8/2vh+ziDV8m56TBac2GuP:5DHmoniNy8L8g4RgoBO8/2vhDX56TY

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\54eb180e8eaa667b82be723066f29b14456b00d8a69c100d56f9a530398fba85.exe
    "C:\Users\Admin\AppData\Local\Temp\54eb180e8eaa667b82be723066f29b14456b00d8a69c100d56f9a530398fba85.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Windows\DBSever0.EXE
      C:\Windows\DBSever0.EXE
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:4224
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Temp0.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4536

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Temp0.bat

          Filesize

          302B

          MD5

          3e38bd4381d7436a12050e7d3694f2f4

          SHA1

          b11398839b605f5ff90c44329687f7211cdbacbb

          SHA256

          08cd90f4174f01a6db407ad4eb9a796831c96b3d6dfc0d8094968286c83cecf0

          SHA512

          bc9add20da92e5015307c164dfcbcc53fa35a24f05ccc923071dbb8176dd64ab437429f454f41659bf9b732dfc5cd5a3ccbf8d4f2d75f3ce664c969c52375701

        • C:\Windows\DBSever0.EXE

          Filesize

          636KB

          MD5

          40bfa3555056d3efea92710b7599ef16

          SHA1

          fba07b8f8cdea776326ecddadf2007483414ee33

          SHA256

          345024717c977d02c4821334f6e7cce22cd64c53a28d94ed34e2f238ab4a8320

          SHA512

          d2b959afc72a6b365f80fa5ed69b26dccabcb6579c6c8183d2a193b2a400e96f055fe039374c8773fee1a079e4fecc53e9f7baca94b72e9449004e3f68cefe3b

        • memory/4224-10-0x0000000010000000-0x0000000010073000-memory.dmp

          Filesize

          460KB

        • memory/4224-12-0x0000000010000000-0x0000000010073000-memory.dmp

          Filesize

          460KB

        • memory/4888-8-0x0000000010000000-0x0000000010073000-memory.dmp

          Filesize

          460KB