Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 07:49

General

  • Target

    afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe

  • Size

    8.6MB

  • MD5

    aaaca3815bcc6ddf5ccd94d26f0a7232

  • SHA1

    b1908791deb9d491ec15a02a21ec731af490f63e

  • SHA256

    afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437

  • SHA512

    9e69d3021ddf725dbf5405b2a155e464e7aea9dba5bba54031cee3cf26b24e37a3a137668ef70b387f0736d3086d58adc7ddeb14b313a48913f0c1f18ad95f8a

  • SSDEEP

    196608:+IgRNOW81jDGEePnJCdzNX/2WdCNinBiEJhhTXfhGMlxqikf2Lt:NgE5DbeRStLCNIVXf/uR6

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 2 IoCs
  • Drops file in Windows directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe
    "C:\Users\Admin\AppData\Local\Temp\afa7abaf2d2ee3b3d7edee30b4c486844d23be4850a4c5f64e39a4d70d797437.exe"
    1⤵
    • Drops desktop.ini file(s)
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4660
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\lewuo3jx.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3512
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES829E.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC829D.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3184

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\ALarkPOPSetup.ini

    Filesize

    37B

    MD5

    510f9fbee05857f8dd43239ca9c3afb4

    SHA1

    b1475e4bdc4379e8e19d628cc93ed694aba57379

    SHA256

    3105b20b3c0b1a3cf8bdf5371310d36d36cd54a6c13d19f8bae419ffbcccbc00

    SHA512

    b2bc9c0c9da65aff17672de55c97e3a70a9e0aac082856c8290750523ee6947d85cd008e8047fb363d97473a29006f8a8ec7a911c835790354694e3d06b29d4b

  • C:\Users\Admin\AppData\Local\Temp\RES829E.tmp

    Filesize

    1KB

    MD5

    4c4f1a549f4861da008fea66d7be6d5d

    SHA1

    f3d9406cb5ef31513bf3013a39bcadf77792f93e

    SHA256

    883d74c7d2e366fb9651de11591dd78af1e0c457339d6d04ddbe570078e69afc

    SHA512

    77930cb475e70e27bc926d52c33d1dc1d9329f57a44e196115ec0a22d44bf90cb2bc830ffaf64499e506d7b894549d3f85b50593a9137505814c80ef5358541c

  • C:\Users\Admin\AppData\Local\Temp\lewuo3jx.dll

    Filesize

    12KB

    MD5

    b8f68be446022dd802c2c7cd29568050

    SHA1

    eb313c84d006e9320487ef1247bb4cb5cb3ae36a

    SHA256

    37619eb9c895e131250c2fe2fabcdb95f91665bfd4d89343e89f75a67a81951f

    SHA512

    26d12add584a11767dffbdfb2e366511a49022afb4cd9359f3fecbd7bdf0b9560a3edaad4f32d38ea7f64c79cbc48d19dd17d1f6b768c5382cfc0945161f9a52

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC829D.tmp

    Filesize

    652B

    MD5

    c161e9ca49e15018c40624bc9e88e864

    SHA1

    3f6ec71d685880afadc514c12e09d1d70197f475

    SHA256

    0f8776a940b0027a520276caedfe1a0b37fef3203a3226f305bf35fa90d6e469

    SHA512

    26e879cde8940175a4d1c3c7e918bacee30e197c8474744fe97e5c7d6e4c98feac5f1abc4469f117c9305a86eb855fbff42b0ffece4a63450deff55a11ec1863

  • \??\c:\Users\Admin\AppData\Local\Temp\lewuo3jx.0.cs

    Filesize

    14KB

    MD5

    b6f33a549d721b65a0b1162fea03667f

    SHA1

    3d0689bd3f5bd642ce1ec60de2c30afd0e55c72f

    SHA256

    3d15ca0dcc27ce5a29e88b9824e84dc8be28017280917c7e28b8154796076be5

    SHA512

    ef7c4deed575286ffe017efe6122bf22f10a38360d775d5e17f9767433d3f3b227efb11bb588da334c18ce91f2060fccb85d0386478d002df5b5c5d710aa0ca0

  • \??\c:\Users\Admin\AppData\Local\Temp\lewuo3jx.cmdline

    Filesize

    290B

    MD5

    b346e8af2e153d4b6416cf7ec3f0b918

    SHA1

    8be4ea74efbd8a08cfb8ed927cc1a71704c2c737

    SHA256

    08ac26422f7071e54540404a1cbc54eea043376fddce2df04dc3f5b68b236372

    SHA512

    9a7b483829815fb6c658fef14ea267d7dfa0504b668b8a623744da72ecdc95420d9714b1064ae2680ba051a0ef16739e270d746a1d3325d238f4791ef570ec49

  • memory/3512-18-0x0000000074930000-0x0000000074EE1000-memory.dmp

    Filesize

    5.7MB

  • memory/3512-25-0x0000000074930000-0x0000000074EE1000-memory.dmp

    Filesize

    5.7MB

  • memory/4660-11-0x0000000074930000-0x0000000074EE1000-memory.dmp

    Filesize

    5.7MB

  • memory/4660-12-0x0000000074930000-0x0000000074EE1000-memory.dmp

    Filesize

    5.7MB

  • memory/4660-0-0x0000000074932000-0x0000000074933000-memory.dmp

    Filesize

    4KB

  • memory/4660-3-0x0000000074930000-0x0000000074EE1000-memory.dmp

    Filesize

    5.7MB

  • memory/4660-2-0x0000000074930000-0x0000000074EE1000-memory.dmp

    Filesize

    5.7MB

  • memory/4660-1-0x0000000074930000-0x0000000074EE1000-memory.dmp

    Filesize

    5.7MB

  • memory/4660-28-0x0000000074932000-0x0000000074933000-memory.dmp

    Filesize

    4KB

  • memory/4660-29-0x0000000074930000-0x0000000074EE1000-memory.dmp

    Filesize

    5.7MB

  • memory/4660-30-0x0000000074930000-0x0000000074EE1000-memory.dmp

    Filesize

    5.7MB