Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-10-2024 04:56

General

  • Target

    Loader 3.0.exe

  • Size

    147KB

  • MD5

    ff4cd364323fc2048c35783a38070aef

  • SHA1

    4736172dd07a3a196343b94dd56b4e4edc0f2bce

  • SHA256

    6dd7522accb6773bade16720b53ca577574defae5b1c7caf4b7fc6826dfed7e7

  • SHA512

    c72b07b78ccbcfad14fa9f7bc3e8a086c29969b4f7f30dbe57a1a173cd82d61a20bf5ead0bc7b627d5d7f7f0def71710e2ce09590be7a886ad6c9414981eb961

  • SSDEEP

    1536:FzICS4AAwczUUf8y8gvMH+1zGSNAojMP95D1xDEtDyI4njdbJBGCkmsQwvB6jr4j:GqJogYkcSNm9V7Dk4F91qYUrnbT

Malware Config

Signatures

  • Renames multiple (634) files with added filename extension

    This suggests ransomware activity of encrypting all the files on the system.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops desktop.ini file(s) 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Drops file in System32 directory 4 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies Control Panel 2 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 13 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Loader 3.0.exe
    "C:\Users\Admin\AppData\Local\Temp\Loader 3.0.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Sets desktop wallpaper using registry
    • System Location Discovery: System Language Discovery
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3444
    • C:\Windows\splwow64.exe
      C:\Windows\splwow64.exe 12288
      2⤵
      • Drops file in System32 directory
      PID:1628
    • C:\ProgramData\CE1E.tmp
      "C:\ProgramData\CE1E.tmp"
      2⤵
      • Checks computer location settings
      • Deletes itself
      • Executes dropped EXE
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: RenamesItself
      • Suspicious use of WriteProcessMemory
      PID:912
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C DEL /F /Q C:\PROGRA~3\CE1E.tmp >> NUL
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1920
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc
    1⤵
      PID:1236
    • C:\Windows\system32\printfilterpipelinesvc.exe
      C:\Windows\system32\printfilterpipelinesvc.exe -Embedding
      1⤵
      • Drops file in System32 directory
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE
        /insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{8230A994-D61C-4FD2-A740-331E5582C6BA}.xps" 133746513906560000
        2⤵
        • Checks processor information in registry
        • Enumerates system info in registry
        • Suspicious use of SetWindowsHookEx
        PID:5008

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\$Recycle.Bin\S-1-5-21-2878641211-696417878-3864914810-1000\UUUUUUUUUUU

      Filesize

      129B

      MD5

      b1e098108cc130b61289eecc0016684d

      SHA1

      5ad52aa608cf01f7520f0f8544c216862aca573f

      SHA256

      98b3c767f359c1c05e716ca772bd228dd78218f18094ab3d00ff2f7226a9705a

      SHA512

      b9a2f0b60a04d6a1467988978593c8066b85b66f289ed372db69039c0ba494753bbc5ddc20efb03aa86d93f8c7d21dfee153a1a2eb98fdd1dfd4a4a48d17cda3

    • C:\Jw5Jgl9mC.README.txt

      Filesize

      1KB

      MD5

      8b28296a2c168d86adbafc888d0f95f0

      SHA1

      49d6b109bf24f39c2c0f62c0796b8693c0bd99e5

      SHA256

      7b3daacf846fe79840647e67d9c5226a7fda47d5b32c24d874654e8ff78ffcc9

      SHA512

      b0f0e0a6f2962250c3b9f87637854756e7a0fcde561aae14654d0dcd1e1013876442c0354e41c5bc8e3ef57f170ac2073874ff22fdc5656f62f930350f9df6ac

    • C:\ProgramData\CE1E.tmp

      Filesize

      14KB

      MD5

      294e9f64cb1642dd89229fff0592856b

      SHA1

      97b148c27f3da29ba7b18d6aee8a0db9102f47c9

      SHA256

      917e115cc403e29b4388e0d175cbfac3e7e40ca1742299fbdb353847db2de7c2

      SHA512

      b87d531890bf1577b9b4af41dddb2cdbbfa164cf197bd5987df3a3075983645a3acba443e289b7bfd338422978a104f55298fbfe346872de0895bde44adc89cf

    • C:\Users\Admin\AppData\Local\Temp\EEEEEEEEEEEEEE

      Filesize

      147KB

      MD5

      f370030e2a0fbc0a9f70a1689a52b785

      SHA1

      d0f947b1bdaa6038d14112166d9794a559daa872

      SHA256

      7c374db0a211a37af0eaf26849ceb7b487f2c898c5068e6275b8d24e9cb83cf6

      SHA512

      7b103d1935ddf6158b117f04467f17c8ff1a3138a1da13ae00ac7de20b5c1374086627611c332a2a1f75a9de3efc6efabe3dbb5413b7f3653f7a72456bf80b17

    • C:\Users\Admin\AppData\Local\Temp\{F64CB0E1-44EE-4886-BBA3-E68299F2AB05}

      Filesize

      4KB

      MD5

      f26e5b9a138c704ff8888269675acf08

      SHA1

      70d56bfd8e9b69cfe2b58e20493beb1b20608566

      SHA256

      1e43f67c92f4e133a62187045bde6ac2a8a993030b5d735fc8f38622dd90006e

      SHA512

      802c25f1da7465b7bc60c62a52451065d3826dbcb8b5752c343f40efbfc8d55b42601639f12c37e94fe425bb8c6ca8eff18d240d7f726bb3bac60cb2bb48e411

    • C:\Users\Admin\Documents\OneNote Notebooks\My Notebook\Open Notebook.onetoc2

      Filesize

      4KB

      MD5

      572de2245b5dca0670ea1b5697bbd665

      SHA1

      21faa1ec4ff7c89778eea6d55e1886727e17e0e5

      SHA256

      ab47766797e51900714c60935a6e31463d698d83abfa4113bb789451fdfa2da9

      SHA512

      636899fc4336da13d61f34750c760cc9214c5a8f08ec9fb4cd3e0370ad9d5403fe075e2d40550334d378995e5c02058b151ab5a5f3d6b5fcc2d0977393471773

    • F:\$RECYCLE.BIN\S-1-5-21-2878641211-696417878-3864914810-1000\DDDDDDDDDDD

      Filesize

      129B

      MD5

      e8e29e97b913424bc424855094dcaf99

      SHA1

      ddcb1a28326e1a159865e402e5356c0c31015838

      SHA256

      0ece581f6f6b2411844ff57005113b1e1f812c57f85af0501127d2a617e958f8

      SHA512

      8f7d6bf86e7a813695fc5e152b3d317c3de9d2c4c5a4309ede30c0890a9c3fda9aa3f8b2cbb3f049e58a27169e414dc0ef5d99e53add5d47a9a19ed690d6d69a

    • memory/3444-2967-0x00000000031A0000-0x00000000031B0000-memory.dmp

      Filesize

      64KB

    • memory/3444-2968-0x00000000031A0000-0x00000000031B0000-memory.dmp

      Filesize

      64KB

    • memory/3444-0-0x00000000031A0000-0x00000000031B0000-memory.dmp

      Filesize

      64KB

    • memory/3444-1-0x00000000031A0000-0x00000000031B0000-memory.dmp

      Filesize

      64KB

    • memory/3444-2966-0x00000000031A0000-0x00000000031B0000-memory.dmp

      Filesize

      64KB

    • memory/3444-2-0x00000000031A0000-0x00000000031B0000-memory.dmp

      Filesize

      64KB

    • memory/5008-2988-0x00007FFAB8190000-0x00007FFAB81A0000-memory.dmp

      Filesize

      64KB

    • memory/5008-2987-0x00007FFAB8190000-0x00007FFAB81A0000-memory.dmp

      Filesize

      64KB

    • memory/5008-2984-0x00007FFAB8190000-0x00007FFAB81A0000-memory.dmp

      Filesize

      64KB

    • memory/5008-3017-0x00007FFAB6020000-0x00007FFAB6030000-memory.dmp

      Filesize

      64KB

    • memory/5008-3018-0x00007FFAB6020000-0x00007FFAB6030000-memory.dmp

      Filesize

      64KB

    • memory/5008-2985-0x00007FFAB8190000-0x00007FFAB81A0000-memory.dmp

      Filesize

      64KB

    • memory/5008-2986-0x00007FFAB8190000-0x00007FFAB81A0000-memory.dmp

      Filesize

      64KB