Analysis

  • max time kernel
    93s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/10/2024, 23:13

General

  • Target

    SkyDriveSetup.exe

  • Size

    4.9MB

  • MD5

    6961f3aec7f861c65091b8fb35086561

  • SHA1

    e3b0fb8d929898ad342002afa28cc265194efe90

  • SHA256

    cc9d7f28a00c0782658cfa90cfa69baebbb056d1838011f30782d2e96e2979fb

  • SHA512

    e0fb908d916647e0297e272ec1428f6b70e4538bfdc2e8a99f45308e3d73165661a0bc3ef1425e6e8ad3da3e321bea9f5a4e10dc4434aeb4d0addf34027464bb

  • SSDEEP

    98304:2qfhtV37w74C0CJmzevREdhOXQTFB74unJSqqgw3LFkkEGr3ra:JfXVrw7RRE2gTgunJSYw3LiWra

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 18 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SkyDriveSetup.exe
    "C:\Users\Admin\AppData\Local\Temp\SkyDriveSetup.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3364
    • C:\Users\Admin\AppData\Local\Temp\SkyDriveSetup.exe
      "C:\Users\Admin\AppData\Local\Temp\SkyDriveSetup.exe" C:\Users\Admin\AppData\Local\Temp\SkyDriveSetup.exe /permachine /silent /childprocess /cusid:S-1-5-21-1045960512-3948844814-3059691613-1000
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4140
      • C:\Windows\SysWOW64\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "0" "4140" "1504" "1424" "1508" "0" "0" "0" "0" "0" "0" "0" "0"
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:2164
      • C:\Windows\SysWOW64\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "0" "4140" "1456" "1512" "1448" "0" "0" "0" "0" "0" "0" "0" "0"
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:1888
    • C:\Users\Admin\AppData\Local\Temp\SkyDriveSetup.exe
      C:\Users\Admin\AppData\Local\Temp\SkyDriveSetup.exe /peruser /childprocess
      2⤵
      • Checks computer location settings
      • Drops file in Windows directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2260
      • C:\Windows\SysWOW64\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "0" "2260" "1732" "1552" "1736" "0" "0" "0" "0" "0" "0" "0" "0"
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:4812
      • C:\Windows\SysWOW64\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "0" "2260" "1864" "1968" "1744" "0" "0" "0" "0" "0" "0" "0" "0"
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:4820
      • C:\Windows\SysWOW64\wermgr.exe
        "C:\Windows\system32\wermgr.exe" "-outproc" "0" "2260" "1432" "1376" "1456" "0" "0" "0" "0" "0" "0" "0" "0"
        3⤵
        • System Location Discovery: System Language Discovery
        • Checks processor information in registry
        • Enumerates system info in registry
        PID:1824
    • C:\Windows\SysWOW64\wermgr.exe
      "C:\Windows\system32\wermgr.exe" "-outproc" "0" "3364" "2060" "1628" "2064" "0" "0" "0" "0" "0" "0" "0" "0"
      2⤵
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:3324

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\ProgramData\Microsoft\Windows\WER\Temp\WERBAE5.tmp.xml

          Filesize

          4KB

          MD5

          376f34e683c01fcb18e6a1c53a4aa729

          SHA1

          5699751c8ab84f87cad18f8a1b16d365bada8185

          SHA256

          a87fcf3981c0cb1b45c117a25165b57a952c07b2b4028a2d419a0201850ba419

          SHA512

          ffb0de7534b1df4a5bfdb47dd6932d1c75219a72001ff7a316394a91e359e4ef849d431fe7c606660b4e6bb476c87adee15357d9812f1b412069a3d63e78f56a

        • C:\Users\Admin\AppData\Local\Microsoft\SkyDrive\setup\logs\2024-10-09_060323_d24-a44.log

          Filesize

          5KB

          MD5

          0cc60d8bd44228d857e867eea1b6a676

          SHA1

          ab912161ebe9fa34218f8921de92ac1be2a6609e

          SHA256

          2a9f0974472cfb7de77ef24ba0825494b312970f452e96708d4edbd5c9b3e53d

          SHA512

          23612e5e48d12abc8603e1100748e60860a2c46776e72954b7d678f39679f509a57fbd0a21438f6387681b2b5a6442b2b09117809db2a972e0914eb3d8ae0c64

        • C:\Users\Admin\AppData\Local\Microsoft\SkyDrive\setup\logs\2024-10-09_060323_d24-a44.log

          Filesize

          6KB

          MD5

          8d6f3dc7d6af3c0dcb22181806d1f37a

          SHA1

          6334135fb7982c51a53bc914f9e8adfc27a92492

          SHA256

          34337191e9276101d5fd019fd290aa9ab4292d79197dc3f94d2eff96fbca2cfe

          SHA512

          5b01481f5590bec71ee6d27722a1917709a51d6e4cb2bdce346dd33d396e533e6b5f15fb75e9e5a3f7bb765976a8ab1d49b9d87ad33407a8ee22b86764b21db4

        • C:\Users\Admin\AppData\Local\Microsoft\SkyDrive\setup\logs\2024-10-09_060324_102c-12e0.log

          Filesize

          7KB

          MD5

          06ef0d5a772e1cd0b5d91da5bb8d967b

          SHA1

          e0cc16ae175b73084f187e6016d3a163aa5dd979

          SHA256

          669b24c192e649e8253e7558b45c12ac70809f48f776fd8c75c9b318217a5c27

          SHA512

          5c14fff1dcbc24e56e656286f1962d16f6361b1803f1eb6a8830a92daa9b8f41a44cd41eed240821c9b1fbb7dbe43c49a738026303d0bd649393b7f4a4fa7376

        • C:\Users\Admin\AppData\Local\Microsoft\SkyDrive\setup\logs\2024-10-09_060324_102c-12e0.log

          Filesize

          7KB

          MD5

          447a8da98ead495f2a90f812c8346731

          SHA1

          1f3c73d1eac52066061be914793170d406f8b6be

          SHA256

          3a8337851abeb97c2b484bd90f68ac2c284b080acc09400b1cbac59fa87c1108

          SHA512

          32094f600529a25839454a68875f2c60e2f66d27087b57b78adb755a6686c365eaae31212347e021902bf7ea3ed53d1a2f75973e575fa6ee3d144400e1f231e3

        • C:\Users\Admin\AppData\Local\Microsoft\SkyDrive\setup\logs\2024-10-09_060324_8d4-1128.log

          Filesize

          5KB

          MD5

          ef468d2e7e649c505b5beea8955c4333

          SHA1

          d2e28bc453180fd76d8d0a3ceb90523fb65eb887

          SHA256

          d8ce9ff6e3717f2c2538cf6213a03eed1744cb667b8e76dd122cf31c0e2bc990

          SHA512

          e80c14132b591fde65512c01653367740400cf13ff916a4c6d7a960f8abb09fa48ebf435107c04a850d9adb27147ce8c0708addad2112017d516f0a9b4894b8e

        • C:\Users\Admin\AppData\Local\Microsoft\SkyDrive\setup\logs\2024-10-09_060324_8d4-1128.log

          Filesize

          6KB

          MD5

          b5026a1437f8304194ed6bf6123e758f

          SHA1

          16c35bc0402b1b3d28e2e76f683fbb6fb3645524

          SHA256

          4f6490a4ee7e4889ea58a3590b9947b843f0a351b9f001a7dc5e99323c817cc6

          SHA512

          2bb1f132caf6ed44c1bf9204ded9b8ab310124d0dfd491d5c8ff15794b4bec6e6a3f9cc4eaa9c23f04082b4e4db276d05eb6f7b0b0ff22f955750b9234dc9107

        • C:\Users\Admin\AppData\Local\Microsoft\SkyDrive\setup\logs\2024-10-09_060324_8d4-1128.log

          Filesize

          7KB

          MD5

          716b9195294ea259133ce5fb1685c87a

          SHA1

          f2a38d12c739d1235e72fa4378d37e0f145fa989

          SHA256

          c4afabdfd5135e379c9e8cc14c2b6ac463b271795928ccc72506d66d820cee64

          SHA512

          f81743500d8c0a2d628fb8cbef24174576fcdb23c6a65fddca26f68bb3f2bacb43cf5ba7a2020e4ac61535ed3e29173c0dcdaecf77b8bf834d75eb264a7c588b

        • C:\Users\Admin\AppData\Local\Temp\tmpB70B.tmp

          Filesize

          4.0MB

          MD5

          77adb580cb498135d0a82cb549188b63

          SHA1

          3f34333dee14db56ef9e26b068aa910098942f4d

          SHA256

          bbef38f8e366fbe02d5e32a221dcec0aed2507a7b69c7bd862aa11c1cc754e49

          SHA512

          8c71d984e7efd06aeac65e35e7ee9ac5f6373b8be56447fe88e328ae84a301d74f7d2231efc9ca22801dfed29747ae69ffdc86f8d02aee019a9b0718cbc408d1

        • memory/2260-12-0x0000000002BA0000-0x0000000002BA1000-memory.dmp

          Filesize

          4KB