Analysis

  • max time kernel
    115s
  • max time network
    120s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/10/2024, 13:27

General

  • Target

    011230ec7da37277c89aa78f24b0f9dbdd897d321244125137b01cc7d676d3ffN.exe

  • Size

    48KB

  • MD5

    f0bb60ffec9674f2ee4dda2ea56f8b00

  • SHA1

    a836a479805ce756ae320f9454f68e60d8d5453d

  • SHA256

    011230ec7da37277c89aa78f24b0f9dbdd897d321244125137b01cc7d676d3ff

  • SHA512

    530593c4671f6b761c20b0696a32ad0eeffef9da14f706cb6c53b5a9ffdce7692c236380d7e40b553fa02fc3d1e04c0032412550207af3eff776bc3bac9befca

  • SSDEEP

    1536:yoMuwospyudrnMjVhDIP4ka3q3oaQOF4nouy8Be:DMcsEknMLDIFEOKoutBe

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 20 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\011230ec7da37277c89aa78f24b0f9dbdd897d321244125137b01cc7d676d3ffN.exe
    "C:\Users\Admin\AppData\Local\Temp\011230ec7da37277c89aa78f24b0f9dbdd897d321244125137b01cc7d676d3ffN.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BxgSM.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft Essentials" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\services.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:4968
    • C:\Users\Admin\AppData\Roaming\services.exe
      "C:\Users\Admin\AppData\Roaming\services.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:536
      • C:\Users\Admin\AppData\Roaming\services.exe
        C:\Users\Admin\AppData\Roaming\services.exe
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:5020

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\BxgSM.txt

    Filesize

    150B

    MD5

    30158d29e765707d6c1f38d4ea60f91b

    SHA1

    e02d5cc507e7f77c0a7f879e3596bd279ddf1f97

    SHA256

    c64a62b30b3ef9c2bb43438659cbbe1d57c1c762d4d58ebf9d188d409421e6f9

    SHA512

    2e72f9529063d74530cc29d04b92837496983d9417c91890ce8a616076889a13f0b1cd7954390b83a3e2e946696e4b7bbb4605b145ad5aa7904f051068ff5ff1

  • C:\Users\Admin\AppData\Roaming\services.txt

    Filesize

    48KB

    MD5

    e9b9f248c5290661beae9e800f66643a

    SHA1

    37139ca6a881e3d3c2f728d0668928bec982e25c

    SHA256

    e83b72274d70eef6d6b2a412c22cae33bd648564063af78441282ee556314fb1

    SHA512

    69d17f67bef6e63d45d186e82d204ec215b0f5bb68c077d668be5ac3ac5d79e8c45f662659ea1e083a3638ba3d390eef7a9c0da6c0be019f360e9e64efd24b0b

  • memory/536-35-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2700-29-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/2700-0-0x0000000000400000-0x000000000044B000-memory.dmp

    Filesize

    300KB

  • memory/5020-45-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-52-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-37-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-38-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-41-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-32-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-49-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-36-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-55-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-58-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-61-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-64-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-67-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-70-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-73-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/5020-76-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB