Analysis

  • max time kernel
    91s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/11/2024, 05:30

General

  • Target

    final_executable.exe

  • Size

    33.4MB

  • MD5

    25dfca9be67c2943c53d9d2a1d478f1a

  • SHA1

    ef7f907b47468164bdb76970278e876474c17bcb

  • SHA256

    bf562448e3d9507d80ee0f89642ef0eeda1a0931ab0edd9d2574f52df4b0e740

  • SHA512

    ab9a757b182347c971c2ef05636a9ddec67d12a7b0f7bc0468b44ce9c172801512022a48c3c3c8dbdd565e32058aa8fc6c95c07219443ea5b7efe95453b20b40

  • SSDEEP

    393216:d76L6otUitqtH7wHtXq2pt2jbOCacCFIK0fpP9HF4VW8yf3nVQx4urYsANulL7ND:d0LoCOn+23s4urYDNulLBiuDj

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\final_executable.exe
    "C:\Users\Admin\AppData\Local\Temp\final_executable.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4732
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "wmic diskdrive get serialnumber"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3732
      • C:\Windows\System32\Wbem\WMIC.exe
        wmic diskdrive get serialnumber
        3⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2352
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /d /s /c "cscript //nologo "C:\Users\Admin\AppData\Roaming\run.vbs""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2904
      • C:\Windows\system32\cscript.exe
        cscript //nologo "C:\Users\Admin\AppData\Roaming\run.vbs"
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:1388
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe" /c installer.bat
          4⤵
            PID:456
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /c exit
            4⤵
              PID:2556
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get serialnumber"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1032
          • C:\Windows\System32\Wbem\WMIC.exe
            wmic baseboard get serialnumber
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:1828
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:764
        • C:\Users\Admin\AppData\Local\Temp\final_executable.exe
          final_executable.exe
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1384
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /d /s /c "wmic diskdrive get serialnumber"
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3080
            • C:\Windows\System32\Wbem\WMIC.exe
              wmic diskdrive get serialnumber
              4⤵
                PID:2136
            • C:\Windows\system32\cmd.exe
              C:\Windows\system32\cmd.exe /d /s /c "cscript //nologo "C:\Users\Admin\AppData\Roaming\run.vbs""
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2008
              • C:\Windows\system32\cscript.exe
                cscript //nologo "C:\Users\Admin\AppData\Roaming\run.vbs"
                4⤵
                • Checks computer location settings
                • Suspicious use of WriteProcessMemory
                PID:3336
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c installer.bat
                  5⤵
                    PID:3536
                  • C:\Windows\System32\cmd.exe
                    "C:\Windows\System32\cmd.exe" /c exit
                    5⤵
                      PID:2944
                • C:\Windows\system32\cmd.exe
                  C:\Windows\system32\cmd.exe /d /s /c "wmic baseboard get serialnumber"
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:5048
                  • C:\Windows\System32\Wbem\WMIC.exe
                    wmic baseboard get serialnumber
                    4⤵
                      PID:2516

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Roaming\main.bat

                Filesize

                258B

                MD5

                6bae05162350845f5dbd4ecad51065d1

                SHA1

                6bfc63d7dd01c682cb1625db80cb9a3ac7e6b9b4

                SHA256

                1a1df7abdb6699417df6d0ac8af95680405c124536f0859346a2a1871d2c53ee

                SHA512

                6ee25a6cad103f7ac746f2dbe7184200d31b72ff27696e2945f9eb9cac6bdc85e981ed5b30a7206aa9d8fcdb31bb36a0e3945423a85a7d413fdd8cf89e95afda

              • C:\Users\Admin\AppData\Roaming\run.vbs

                Filesize

                132B

                MD5

                6faa3748845b506c5c43ca84dac689ce

                SHA1

                97ecda70f297d5d42e7b83b38ff9942c33446014

                SHA256

                cf9626dcc990dec707da1d09c5bdb26d6ca1a3dfcddb17f3135d9a6aff51b159

                SHA512

                b42da4cd7a85003d0f9c8cae55f461b862cd2a94296dfe1262bd832d5342d30f6eb971e1549e818bb26cea944f080a42ea54453f64c01a8fc50b4038a3f963bc