Analysis

  • max time kernel
    141s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/10/2024, 09:52

General

  • Target

    ui/Start_G_En.bat

  • Size

    103B

  • MD5

    d06a07e37940fb16d135c6a082e24b04

  • SHA1

    c0350a4aff54f7a1b4949c58f86e2414b27b53e2

  • SHA256

    256015049d786a64cb4f55232b563d5b6c47bfa9ea8801c5b00d8b93887791fc

  • SHA512

    003914544b31b9de527fa2687ef253dcea768417b8e39ee5a4ab199e8bb16a6476c32272a2f658bf06e9cc3266d26b081ce0c3c1d00637b63220890dceee1c65

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Drops file in Program Files directory 51 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 6 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\ui\Start_G_En.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1800
    • C:\Users\Admin\AppData\Local\Temp\ui\AndroidEmulatorEn.exe
      "AndroidEmulatorEn.exe" -vm 100
      2⤵
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2864
      • C:\Windows\svchost.exe
        "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\ui\AndroidEmulatorEn.exe" -vm 100
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1040
        • C:\Users\Admin\AppData\Local\Temp\ui\AndroidEmulatorEn.exe
          "C:\Users\Admin\AppData\Local\Temp\ui\AndroidEmulatorEn.exe" -vm 100
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2672
          • C:\Users\Admin\AppData\Local\Temp\ui\pluginsen\Updater32.exe
            "C:\Users\Admin\AppData\Local\Temp\ui\pluginsen\Updater32.exe"
            5⤵
            • Drops file in Windows directory
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:452
            • C:\Windows\svchost.exe
              "C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\ui\pluginsen\Updater32.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1364
              • C:\Users\Admin\AppData\Local\Temp\ui\pluginsen\Updater32.exe
                "C:\Users\Admin\AppData\Local\Temp\ui\pluginsen\Updater32.exe"
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:4748
    • C:\Windows\system32\timeout.exe
      timeout /t 4
      2⤵
      • Delays execution with timeout.exe
      PID:1504
  • C:\Windows\svchost.exe
    C:\Windows\svchost.exe
    1⤵
    • Executes dropped EXE
    • Drops file in Program Files directory
    PID:4996

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\ui\AndroidEmulatorEn.exe

          Filesize

          6.4MB

          MD5

          ef1159cb9f26fd7308533a423c65ede3

          SHA1

          ed002d46a58ed58ef8bbb8b1b4b453ba37524d79

          SHA256

          b72325fe4c00e3fc530c95f45192f3d9659fe69c1f408453279e9c6f2d79e288

          SHA512

          35645f28dbada62e60c47835439a302c8e38797f1a872f830f82d51139322af98c891692a441608ef906919fa12b8baee2dabcc32fefc31abbb11c55b0973b2c

        • C:\Users\Admin\AppData\Local\Temp\ui\pluginsen\Updater32.exe

          Filesize

          1.8MB

          MD5

          e0fe52ae805335297f952a10deb97572

          SHA1

          6071995bb9ab585590fc03e34af97d99d23a070d

          SHA256

          191d0ed838a87730c7670f580a0ecdc16b63244834ebd5548a19b19a5e5ec735

          SHA512

          4abdcfc82110adf67f405b6282f130b65c9c7d85f2c27c72635464ac8cc761e597706e25b8bbe46a98221e316614637786157bb8679591685e6bb113b5be7229

        • C:\Windows\svchost.exe

          Filesize

          35KB

          MD5

          9e3c13b6556d5636b745d3e466d47467

          SHA1

          2ac1c19e268c49bc508f83fe3d20f495deb3e538

          SHA256

          20af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8

          SHA512

          5a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b

        • memory/452-12-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/1040-10-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/1364-19-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/2864-4-0x0000000000400000-0x0000000000471000-memory.dmp

          Filesize

          452KB

        • memory/4996-20-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/4996-22-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/4996-25-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB

        • memory/4996-29-0x0000000000400000-0x000000000040D000-memory.dmp

          Filesize

          52KB