Analysis

  • max time kernel
    94s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06/10/2024, 12:24

General

  • Target

    7aa0f21e3daa05edf5cc09a397247a9471d2e7558703e56fd8f4d1b399dcdcf5N.exe

  • Size

    274KB

  • MD5

    0a7bd79d9cd424f7cf646a7883c6c400

  • SHA1

    8685a2b580bf964af97446a3229a34e32a38501e

  • SHA256

    7aa0f21e3daa05edf5cc09a397247a9471d2e7558703e56fd8f4d1b399dcdcf5

  • SHA512

    ec268ad373b1f36f400383a75452a878212f98e59de075be899f31e5336d2b81f80a7208a7182eeff17982b797380f94c5f7db615cd01c13703a91fd073d62cc

  • SSDEEP

    6144:7saocyLCfcZxEQx8OXsk8Y018Y/+kY6F2hIWFl4WWlGTamELkTVS:7tobwQ+Ock8Y0hZYg2hIWFl5A+CLcVS

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7aa0f21e3daa05edf5cc09a397247a9471d2e7558703e56fd8f4d1b399dcdcf5N.exe
    "C:\Users\Admin\AppData\Local\Temp\7aa0f21e3daa05edf5cc09a397247a9471d2e7558703e56fd8f4d1b399dcdcf5N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3652
    • C:\Users\Admin\AppData\Local\Temp\nsyB596.tmp\installer.exe
      C:\Users\Admin\AppData\Local\Temp\nsyB596.tmp\installer.exe 4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe /t /dT131900333S /e5844780 /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Users\Admin\AppData\Local\Temp\nsyB596.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe
        "C:\Users\Admin\AppData\Local\Temp\nsyB596.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe" /t /dT131900333S /e5844780 /u4fe0cf9f-1fe4-4abb-905a-57915bc06f2f
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:3552

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\12236C41CDDF9E40BA5606CDF086B821

          Filesize

          75KB

          MD5

          8b601e4a878a5f36fed27d3649df0030

          SHA1

          d198666c5bfa454ab6ca6cb28a5b47923bd2a3a6

          SHA256

          b149e2f1d25834aee44c8e7f9ba60e680862f969dfb00cedb523c8bb3209317a

          SHA512

          eed65ee83b24e8d9965bd507b48806ec51ba929b1a8cd645a15bb6fbd31cdbc784f6d79fef62790299acf287d3624bf55c5076901e4f5ede627aa053be64ad94

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EDCF682921FE94F4A02A43CD1A28E6B

          Filesize

          604B

          MD5

          3a0e39c53630ecfc2720aee27fe32557

          SHA1

          ce9b2fbd4efce495b07ac98b4cb54b12dd3cf3c0

          SHA256

          18da8779683e3e688ac75a896d738eb4e958763e153e56cb06432bafd3d6ef38

          SHA512

          3598a8fa245b68d4ea236355c00c80710105704efb08e889edea0afd79e079224083c0d034e6b2454189bb8057ea9037ae48e0791bc5b6c54a4af90541fda166

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\955CAB6FF6A24D5820D50B5BA1CF79C7_CC1689C2A9A5CB35265F3C2516751959

          Filesize

          5B

          MD5

          4842e206e4cfff2954901467ad54169e

          SHA1

          80c9820ff2efe8aa3d361df7011ae6eee35ec4f0

          SHA256

          2acab1228e8935d5dfdd1756b8a19698b6c8b786c90f87993ce9799a67a96e4e

          SHA512

          ff537b1808fcb03cfb52f768fbd7e7bd66baf6a8558ee5b8f2a02f629e021aa88a1df7a8750bae1f04f3b9d86da56f0bdcba2fdbc81d366da6c97eb76ecb6cba

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\12236C41CDDF9E40BA5606CDF086B821

          Filesize

          202B

          MD5

          ec2775e072e78293c9f08d9d5d3ddc54

          SHA1

          a01191323ad13deff2c5d56e13fd73fca2974f25

          SHA256

          6df6fa3ef3381f81f5431d2f25f13693810cd8e9b15274f86b0370a84c589ddd

          SHA512

          a0c3d44e456ceb5002bc6845cc83c1044fc9b5c7370566001ce61ea808b560bc8f7ebe6af40e6d9294093a2802410048f359b18a6f41b2d07d84abbd3e576040

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EDCF682921FE94F4A02A43CD1A28E6B

          Filesize

          188B

          MD5

          706acc4d405111deb9ff317bb343520c

          SHA1

          178a6ade594c44d8be58b081a170c910f169feea

          SHA256

          2fb51f18f5052862f2b02d59f27fec573ffbefe2cd2f37f0c3ad41010425ad15

          SHA512

          8e72fa655ed4b974bd5310b83097e162c3b73d5dc5db448b01cca451ffd973574832179d3c1fae68a13b2193d002b0e7b91c661645ccc82b646ee86cf388626b

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_AD9E7615297A3A83320AACE5801A04F9

          Filesize

          404B

          MD5

          8952321ef5f32e71362481985685c6a3

          SHA1

          e8eed6f89b6abd7fcbf017cefe5ba439a463b391

          SHA256

          a3f26d544c0dbbb840865e089f869b7358b72c72a646512c2cb8db1f6b171144

          SHA512

          ec8e27eadd4574e048ee93a5b50689dd3ad5bee5a1a4eef7804f76afe7e9ac70c6b9646add7d9a8fe613aa8ac3c9412cbccb01bd6791ed7de221272b00e19eba

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\955CAB6FF6A24D5820D50B5BA1CF79C7_CC1689C2A9A5CB35265F3C2516751959

          Filesize

          482B

          MD5

          7b96cdc8c2693b1939bc47253dd05f01

          SHA1

          1d7f91010a339f378dd9c91310cffa8fabf91cc5

          SHA256

          b0e73d771a2161f85ab3e0faa1d26d92a552ee1724eeb48d9b6974bb63833696

          SHA512

          66c07c7430625014929ea740800567bd1be840ab0488615875e8c31bef0add0252137c273f9419280aea64a012ddce5cb1ce33dd191384446bd4ff5630824ec3

        • C:\Users\Admin\AppData\Local\Temp\nsyB596.tmp\4fe0cf9f-1fe4-4abb-905a-57915bc06f2f.exe

          Filesize

          256KB

          MD5

          6e68cf541f031c7de9da6ec8d86862aa

          SHA1

          115f143b5f585a27006159dc1b2d4d23a7af5295

          SHA256

          d1763b911eebce060a4c479190e83ff5747f5e75f938fb1cb23d5fcaba249e35

          SHA512

          022af872f2343293a0d71c6cc3ca3f13001ce7ad8e04cf740b75574272cad1dcb40a97a0e860082e7080a69a0367438728f1983317349d5a33ca969c3d877de1

        • C:\Users\Admin\AppData\Local\Temp\nsyB596.tmp\installer.exe

          Filesize

          214KB

          MD5

          7cf3bce5ecf2aea97b49e2eba8ca0aba

          SHA1

          543f5fc23df08f946488d27b2fb16b13b6311d1a

          SHA256

          7358afae03a24b31c0d82ee4e5fd2f17cafe6c3bdd8e26326aa4118f2169f736

          SHA512

          5f9184189940af27e25ae2988db8d15923dac81b2410c5fe3287f126fb50df43735fccb4e4d9f376e9f24700604c157aa1828622dab54014d9583a56ab698d8d

        • C:\Users\Admin\AppData\Local\Temp\nsyB596.tmp\nsExec.dll

          Filesize

          8KB

          MD5

          249ae678f0dac4c625c6de6aca53823a

          SHA1

          6ac2b9e90e8445fed4c45c5dbf2d0227cd3b5201

          SHA256

          7298024a36310b7c4c112be87b61b62a0b1be493e2d5252a19e5e976daf674ce

          SHA512

          66e4081a40f3191bf28b810cf8411cb3c8c3e3ec5943e18d6672414fb5e7b4364f862cba44c9115c599ac90890ef02a773e254e7c979e930946bc52b0693aad7

        • memory/2984-11-0x00000000744D0000-0x0000000074A81000-memory.dmp

          Filesize

          5.7MB

        • memory/2984-10-0x00000000744D0000-0x0000000074A81000-memory.dmp

          Filesize

          5.7MB

        • memory/2984-9-0x00000000744D2000-0x00000000744D3000-memory.dmp

          Filesize

          4KB

        • memory/2984-57-0x00000000744D2000-0x00000000744D3000-memory.dmp

          Filesize

          4KB

        • memory/2984-58-0x00000000744D0000-0x0000000074A81000-memory.dmp

          Filesize

          5.7MB

        • memory/2984-62-0x00000000744D0000-0x0000000074A81000-memory.dmp

          Filesize

          5.7MB

        • memory/3552-44-0x00000000744D0000-0x0000000074A81000-memory.dmp

          Filesize

          5.7MB

        • memory/3552-54-0x00000000744D0000-0x0000000074A81000-memory.dmp

          Filesize

          5.7MB

        • memory/3552-53-0x00000000744D0000-0x0000000074A81000-memory.dmp

          Filesize

          5.7MB

        • memory/3552-55-0x00000000744D0000-0x0000000074A81000-memory.dmp

          Filesize

          5.7MB

        • memory/3552-56-0x00000000744D0000-0x0000000074A81000-memory.dmp

          Filesize

          5.7MB

        • memory/3552-60-0x00000000744D0000-0x0000000074A81000-memory.dmp

          Filesize

          5.7MB

        • memory/3652-66-0x0000000000400000-0x0000000000439000-memory.dmp

          Filesize

          228KB