Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/11/2024, 14:15

General

  • Target

    3.exe

  • Size

    27.7MB

  • MD5

    e516566b25ae853edd6aad00854d782a

  • SHA1

    868bc5e3b851337eb9094de303e395fc5be8d7ae

  • SHA256

    9cb2b6cafc2c6ec61d2f997789e7a923d71b8663f57a531820d958971f8a8e84

  • SHA512

    7b631df7d1786f901669869020430a2caa7b8fc493c5331a00137f60af0827e8c42638a89f1381aed2954bc0b280a1591a0561ba3aad5503f541d8ca12f466c5

  • SSDEEP

    393216:aT903qKSVL/D0mOWBLGZz1cVeN1zSuCK+RO4b61B2YpLlsmb2wIoV1Keejdnd:ah0OVL/rBLGp1JdCr6zRlsm1IoV1G9d

Score
7/10

Malware Config

Signatures

  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates connected drives 3 TTPs 21 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3.exe
    "C:\Users\Admin\AppData\Local\Temp\3.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4324
    • C:\Users\Admin\AppData\Local\Temp\3.exe
      "C:\Users\Admin\AppData\Local\Temp\3.exe"
      2⤵
      • Checks BIOS information in registry
      • Checks computer location settings
      • Enumerates connected drives
      • System Location Discovery: System Language Discovery
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious use of WriteProcessMemory
      PID:1288
      • C:\Users\Admin\AppData\Local\Temp\3.exe
        "C:\Users\Admin\AppData\Local\Temp\3.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4460
        • C:\Users\Admin\AppData\Local\Temp\3.exe
          "C:\Users\Admin\AppData\Local\Temp\3.exe"
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1616

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ColudP.s

    Filesize

    1B

    MD5

    c4ca4238a0b923820dcc509a6f75849b

    SHA1

    356a192b7913b04c54574d18c28d46e6395428ab

    SHA256

    6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

    SHA512

    4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

  • C:\Users\Admin\AppData\Local\Temp\Temp.dat

    Filesize

    4.5MB

    MD5

    9b77414cc34417bb9dd753e14e26ef49

    SHA1

    54cc4425f9656a19fcde9cb694ffff221f8b733f

    SHA256

    d0b0427a276b2506138bb4bc223e27eed7a33aeea7a7ac080b2ec85c5d950ffe

    SHA512

    d91ea43e40bc864c7587f9e5ec03ada8a7d027c4c393dfc6ca6f004b4cc89e8157a33672439020e2081a224c22840653dda4976a89d5378404cbae2b53ad9edc

  • memory/1288-11-0x0000000000400000-0x0000000000F24000-memory.dmp

    Filesize

    11.1MB

  • memory/1288-15-0x00000000030E0000-0x00000000033F2000-memory.dmp

    Filesize

    3.1MB

  • memory/1288-42-0x00000000030E0000-0x00000000033F2000-memory.dmp

    Filesize

    3.1MB

  • memory/1288-31-0x0000000000400000-0x0000000000F24000-memory.dmp

    Filesize

    11.1MB

  • memory/1288-28-0x00000000030E0000-0x00000000033F2000-memory.dmp

    Filesize

    3.1MB

  • memory/1288-17-0x00000000030E0000-0x00000000033F2000-memory.dmp

    Filesize

    3.1MB

  • memory/1288-16-0x00000000030E0000-0x00000000033F2000-memory.dmp

    Filesize

    3.1MB

  • memory/1288-12-0x00000000030E0000-0x00000000033F2000-memory.dmp

    Filesize

    3.1MB

  • memory/1288-14-0x00000000030E0000-0x00000000033F2000-memory.dmp

    Filesize

    3.1MB

  • memory/1288-18-0x00000000030E0000-0x00000000033F2000-memory.dmp

    Filesize

    3.1MB

  • memory/1288-24-0x00000000030E0000-0x00000000033F2000-memory.dmp

    Filesize

    3.1MB

  • memory/1288-20-0x0000000000400000-0x0000000000F24000-memory.dmp

    Filesize

    11.1MB

  • memory/1288-19-0x0000000000400000-0x0000000000F24000-memory.dmp

    Filesize

    11.1MB

  • memory/1616-27-0x00000000030E0000-0x00000000033F2000-memory.dmp

    Filesize

    3.1MB

  • memory/1616-45-0x0000000000400000-0x0000000000F24000-memory.dmp

    Filesize

    11.1MB

  • memory/4324-2-0x0000000010000000-0x0000000010B48000-memory.dmp

    Filesize

    11.3MB

  • memory/4324-10-0x0000000000400000-0x00000000030D5000-memory.dmp

    Filesize

    44.8MB

  • memory/4324-4-0x0000000010000000-0x0000000010B48000-memory.dmp

    Filesize

    11.3MB

  • memory/4324-7-0x0000000000400000-0x00000000030D5000-memory.dmp

    Filesize

    44.8MB

  • memory/4324-0-0x0000000000400000-0x00000000030D5000-memory.dmp

    Filesize

    44.8MB

  • memory/4324-9-0x0000000010000000-0x0000000010B48000-memory.dmp

    Filesize

    11.3MB

  • memory/4324-8-0x0000000010000000-0x0000000010B48000-memory.dmp

    Filesize

    11.3MB

  • memory/4324-1-0x0000000004E30000-0x0000000004E33000-memory.dmp

    Filesize

    12KB

  • memory/4460-29-0x0000000000400000-0x00000000030D5000-memory.dmp

    Filesize

    44.8MB