Analysis
-
max time kernel
125s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-10-2024 20:54
Behavioral task
behavioral1
Sample
New Client.exe
Resource
win10v2004-20240802-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
New Client.exe
-
Size
65KB
-
MD5
73d3a7f8e88738107d9af5dce1d0aa01
-
SHA1
4fc3adf92eb563101d218e67e65e66321a9609ad
-
SHA256
962a9410609dda2ee32b704ba31d4cb4f70f14249cd8a183f5ebfaea63973c1d
-
SHA512
12ed60a8cbd417e42297c14b5527c7eeb60b828a3124463b96e4d228c9b3ea96da11b836bde9478fcb65aadd1ba9cd743b038825aa24460ccd82fbc869a63612
-
SSDEEP
1536:Aaawk8oN36tlQviFw10AglBnvA3fLteF3nLrB9z3n3aF9bJS9vM:Aaawk8oN36tlQviFCnUBnofWl9znaF9J
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation New Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language choice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Client.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings New Client.exe Key created \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe 5064 New Client.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 5064 New Client.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1604 OpenWith.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5064 wrote to memory of 348 5064 New Client.exe 95 PID 5064 wrote to memory of 348 5064 New Client.exe 95 PID 5064 wrote to memory of 348 5064 New Client.exe 95 PID 348 wrote to memory of 1640 348 cmd.exe 97 PID 348 wrote to memory of 1640 348 cmd.exe 97 PID 348 wrote to memory of 1640 348 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\New Client.exe"C:\Users\Admin\AppData\Local\Temp\New Client.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 5 & Del "C:\Users\Admin\AppData\Local\Temp\New Client.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 53⤵
- System Location Discovery: System Language Discovery
PID:1640
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4252,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=3004 /prefetch:81⤵PID:616
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1604