Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 10:04

General

  • Target

    08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe

  • Size

    7.2MB

  • MD5

    297896830676f90adfba999a29954268

  • SHA1

    4b6e74e0b0c9bec0d5955c4b85d6f731ebdde377

  • SHA256

    08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0

  • SHA512

    0fa63e3e766f0a4bb3c311e2be12426674296af5525dafb2a6a5a71eabdf000dcf9958dc41c3e2e73a6698b69f151a8d3d89279973650ce388331c0ce98da8c1

  • SSDEEP

    196608:FYgMJpm7T/1EE5cRnHLcfLUwvKqjTY/mvZCVkR12trqbB:FYgMm7T/KEeRHAfwdmYwZCVMv

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe
    "C:\Users\Admin\AppData\Local\Temp\08b6dd81fd13c91df4330318a08ec33a4c9660a3e44da7ae0e3ea6cadebe2cf0.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\LMIIgnition.exe
      "C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\LMIIgnition.exe" -install
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1944
      • C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\LMIGuardianSvc.exe
        "C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\LMIGuardianSvc.exe" /escort 1944
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of AdjustPrivilegeToken
        PID:5004
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IgnE29F.tmp.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3856
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 5 127.0.0.1
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4664
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IgnE32D.tmp.cmd" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3724
        • C:\Windows\SysWOW64\PING.EXE
          ping -n 5 127.0.0.1
          4⤵
          • System Location Discovery: System Language Discovery
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:1196
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp.cmd" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3664
      • C:\Windows\SysWOW64\PING.EXE
        ping -n 2 127.0.0.1
        3⤵
        • System Location Discovery: System Language Discovery
        • System Network Configuration Discovery: Internet Connection Discovery
        • Runs ping.exe
        PID:2228

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3E3E9689537B6B136ECF210088069D55_EF6C9357BB54DDB629FD2D79F1594F95

    Filesize

    727B

    MD5

    f470e4a9cfbefc92da69532e162af1e6

    SHA1

    e754a46bb17f82bc23b1d72222a4090c07c3c6d4

    SHA256

    e0d82949ca6332aabbbc665d1895bfcbb3727eec80970548c8893ff39592b6d7

    SHA512

    780ccbdd95ade9dd41865193d00da7c260df0033699b08ac683730365850548eb871853909228a9acb9453c7767f5b3c18c53b4f5e5417f97a5718f37dfc5681

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    471B

    MD5

    719182e07998ae9226d45680aa1fe178

    SHA1

    8f8b03c110c129cb3a35841ed959de7a7266ffec

    SHA256

    8f1d64c2c4dbb6ca892083e4b4a8bdb4585597e1269c218340c6b12517bb3dbe

    SHA512

    2df474f0ac4d1ef93b14deda32c5476da130bc41f37c0a5cd0c271c990914613c3c788116a4b87d44876695f71e5a131847fdf96d609364c06cb2f5ed6ce76a3

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_325DC716E4289E0AE281439314ED4BFA

    Filesize

    727B

    MD5

    b8c9b821e711a6914d4050486cad3db9

    SHA1

    76cb62122d0c138c8fdfa3f0f8afad071cfff104

    SHA256

    91f57cf87fbf0d9e2d75515d8a8d2ea2a91d00aada466a22a754ce6706871a5e

    SHA512

    2eb543118d4d292c69b1ceb1098ed954936d71a7387cc94a47f215972f30a04f33800864b6c1fc075e0dc24e7de1f8feaa11f35f047155b3b6c82f4b8cedc8e6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    727B

    MD5

    4f2f44acff5c280ecd26b5e7144aff24

    SHA1

    d542052f27cf058cd2bd7d74e75deb8a009bb334

    SHA256

    c9725747ce7f281ac09f3a2287a236369b00e99f310eb837c45b2b4f66b82030

    SHA512

    33d4fcb341e625103b16af3f7b37f4fed5e8d56256980e341fff71356d1a1296192741b96be97de703d8f54af24e3438d0a514edb621ee6e42b1dc4d79089d45

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BB

    Filesize

    727B

    MD5

    ff40091b1fd272db403fbf05cd0cd28e

    SHA1

    4f20e2f9d55f6831f19fa8dd5e2476529d243295

    SHA256

    a53975e3a270aa9640566a6256e9a4ccfb98c9416d81825eb8559c1443c2b20d

    SHA512

    001813f6c385376a55c6d98e99d904cc30b8d31b3a78e3718882d913228d1986022571f2886e2dfa373adde707864887785c3a92e7051941a2d0551ed0e7a030

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3E3E9689537B6B136ECF210088069D55_EF6C9357BB54DDB629FD2D79F1594F95

    Filesize

    416B

    MD5

    24fcfcf9915b13d98134eaa9e3f67a45

    SHA1

    addf8497b5e3ce7fb4d7a06da4000ce630646511

    SHA256

    a0442a18e647cb0589bca12403ca4ac8029803e53691282112112bfed73e1797

    SHA512

    23fa29df710360d6933319b6cbeb70086ee82518903c58d37a2b1fb2288d314bba25b6dbada9289cd4dbf4fdad6fc297045c5e5a4293ed96fb8e65ab48d2cba2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB

    Filesize

    400B

    MD5

    930cddb398fc52406b16394a97b722e1

    SHA1

    2cc3d05f5cee50fd1b06473709a003924ece1c3c

    SHA256

    16b2a8ce44b064362585ae6cb1c23aad1629210fd6ba5a3c7551b00e6f0c0efa

    SHA512

    9d1f12c446e716799b1a1b059e846271cbc9393eb17e1765705cf7f43888265deb961c07c00daf8b1672939271dc75eaa2ac16d2805c2c4d6a4617410c0c61be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_325DC716E4289E0AE281439314ED4BFA

    Filesize

    408B

    MD5

    043556712cdd8c26b59e026857050b07

    SHA1

    9b5419ba32699836fb01b3be7b37de1ab2d6e92d

    SHA256

    e23235871bc3b17576e7d07e13850abf1b05f053040f3ce14ba0c7979041fe62

    SHA512

    5ca9e14efde4aaa7760831ed3d0ea46b9e8a01aae60e3063d379a1403099a94d82d7b34b3c3105b4571d97aa3e87e52241446e858d2bdb571044c0e50beb6282

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141

    Filesize

    412B

    MD5

    c8824c312c588f8e8a4e9a138ca1fc46

    SHA1

    5676eb5bf332ea51a7e0882574a6906d6c4468d1

    SHA256

    5dd839d766f681f8161512d115f250cc989260ccf07eea824d0c948ffe499f84

    SHA512

    67ae766e30b66178eb3803d86a0a83746b3bcb6239731473dc1ccd7c7c4215023ecbbf3ca69d378145cefd3d7ff8045956dbe17d50c6082a8f5c85da04045d9a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_56DB209C155B5A05FCBF555DF7E6D1BB

    Filesize

    412B

    MD5

    1395e427ebc63f3498862cf3b624287a

    SHA1

    6e4cc635fd0e91a7735e2bcb000192b146ffd96d

    SHA256

    e8b888354515a75faf550d564a79dd592e0cc15e77aeafd058c66205b90d5d3d

    SHA512

    f586e851a729dc987b93e8c008f4198c208fcfd46c4e9389befa8672b5b9cf0467d92efd6ed94450d4e5cb7cde6e4ba1f5509c9b5a625bd33b24713a0d271bd5

  • C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp.cmd

    Filesize

    333B

    MD5

    20057ffaa05cd5e60eb52f9e94b2f965

    SHA1

    c1a3281a432e0f0a4a3d8cc921993525cb900ad8

    SHA256

    dd9df82e7c913b1855e400adbcaf1db69328f284ddfccc847ca6cee2510587d0

    SHA512

    555b278af173d5278d5fb64dcb28f052d972852343059d91b42eb13bda105934392eac19090bd58a6d42de9f3f5c1761d3caf1fc7bbcf21da98958d8b30a9028

  • C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\LMIGuardianDll.dll

    Filesize

    1.8MB

    MD5

    7a44e3665f03c2e46912b59f1614417e

    SHA1

    e152394adbc1165d3487b5b1ebe92d79b13c68ac

    SHA256

    41b48537b2dbee585bf08b928591b05a116bc6b6780044fe5e35445e0a3c58e7

    SHA512

    978953ffead6638487ffda8306a74112428f58d5c626fd6a8e822900bd578395cb05c8ad94a534d8265665cdacbadb816df27bc55b07c267bc372e6360f816d9

  • C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\LMIGuardianEvt.dll

    Filesize

    309KB

    MD5

    bddd0f98e5a371119fa23a3350198f9e

    SHA1

    76534fcf26d7f630343343bdbee3c92b1547de15

    SHA256

    e4139d841096cf863ac8244e08f27b5bf7627acc91264c08719fa5e326b557c5

    SHA512

    ff8add02ebd1887b3e419668f5dacc87c00b9b582db63b926523040a8da754d47e561af43e36d88b7aed4ce90ebbf6d7287cef2d7a35e7d920154087030f0a17

  • C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\LMIGuardianSvc.exe

    Filesize

    419KB

    MD5

    0927b7e7933491dafd1a7b0876bf4578

    SHA1

    0bf0aa0f82efc24f927e099691fb3b1847fbe34d

    SHA256

    413dbae208e147a42b9c7ce622caaedde47e85462a6561ec41db7fb1977c972d

    SHA512

    88b6c51f3673a5d8a3bb795977a2aabb263d37cd139e788ceef76ae2505a22dce1b4ba6171120c0f0ea157e0fd42dcce34aa03446208b2f1f7af8b3675a353a4

  • C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\LMIIgnition.exe

    Filesize

    7.7MB

    MD5

    cdbdf34821c788c28766e825f1033b5d

    SHA1

    c9b75a25c015769d41df51f14c72c2034fca5a55

    SHA256

    8015e7e3bfb288702b25d831813962b65b9d9fe669ca7becf6cf214084c47358

    SHA512

    487d4b1142c440d45b5fd3eaeb50d078848327924c576f1388e4d5b540aa7b7bf75eff696a405f1e489e2dab64dee6380c9b988028c92351afc529253a685446

  • C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\LMIProxyHelper.exe

    Filesize

    74KB

    MD5

    4ac517ece48fa1683df19e86eed922b1

    SHA1

    2595110478889d322b2079f042270d97fc4a4283

    SHA256

    4c64ab865ecd6bdde8414983e5520c2195b501379434d00a6ec6e357f62d4104

    SHA512

    7571b0b21d8bd36ca660e4129aa3556a5a996505557515da2a80fcecbe996a15eca277ba381d63df8a0bb594ca3fb1e18c152f95d226d3e6402384ee15ad671d

  • C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\RACtrl.dll

    Filesize

    8.3MB

    MD5

    ca26ffb2fbe9c7f58d16d7d8aa34a6b4

    SHA1

    301337eb796d98290cb9f438183eebdcb5b57fb3

    SHA256

    c247b359cb9c2710e071dc1f74c354b09438f9c5a8e119abf90cdb7ba62be354

    SHA512

    d06921b5a8fc3636222ae61c87274ebbc7010b3a7944b09e3a1301e16de2ff50e6c6b4f777dd45a8637d47ba37077c8161aa046652d679406664be1234ce5222

  • C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\WebView2Loader.dll

    Filesize

    109KB

    MD5

    1ecc586392d0c11232b840d16428d28b

    SHA1

    6597cc0538e7a1eb9d12a13731d395cd9069413e

    SHA256

    e7ff2415d34a16314724b06d678a53e8d115e93f8ea0e714dc0932f2f102ec49

    SHA512

    21c31e34b4e0ced7a1e6b64b3791e95eae1098d325c7958daed3150de436fee9cf7f42489c323c6d54b5c2876aa6c73fc8b3b15f62613336bd2ed6b8dbfd16b9

  • C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\deployinfo.txt

    Filesize

    147B

    MD5

    e9eee57322fa0882ab7e1e3421c2c9fc

    SHA1

    4440c749c62e0152414cef3e503054442937d01c

    SHA256

    82ffeebd68b19780acaf8548fe3294fcf45ce8fb6208815a0c3ea6d3f3df5f6c

    SHA512

    b2c1e13558810954e6e066e9977f3edab3cbe7e85fd29da9124327d58a126e18fcbca4419a6e7cbbcc2af46253571592c9ac691187e8a0ca009e7c16fbb80ed6

  • C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\ractrlkeyhook.dll

    Filesize

    13KB

    MD5

    2e82f902aa3a55d8c87b40f0dbaf3e38

    SHA1

    ef6ba5f71d59ee76685eaf17c6e296848df55711

    SHA256

    a7d3b22dedaf702edc7a06a338a50ca6996b3867d0d2c9dc767972db9963d9c2

    SHA512

    3d1e00e9d8a660e5fb07eb7b229411ab7441bdc54890afe3148b6238b78992a9a65f92ce07ec951b1ccb226679cbfb3f0f7af6ef447fcf2702bc38b492258202

  • C:\Users\Admin\AppData\Local\Temp\IgnD1D7.tmp\webview.dll

    Filesize

    396KB

    MD5

    0a20b7a69963cfcf5892edd327545990

    SHA1

    bc2c8c9552378988d36fe74470d42482489d4e65

    SHA256

    c265df685d31f2e5ba706484e5aa53af3dee519df20cdaf4607e48794d096a72

    SHA512

    77fae39ff0de23be3065b0861bef8537dc1ca8739b3e1bba0a46126e48747da32015c632a8f86f8c9bc6626e929cffa3c7bfcc9fdc3af1e9e5a5ceab3eb46889

  • C:\Users\Admin\AppData\Local\Temp\IgnE29F.tmp.cmd

    Filesize

    957B

    MD5

    fa447ffcccb74d00bb6c09d13dc3479e

    SHA1

    9d4789bf2671876cc108474241e784e93da4b7d2

    SHA256

    49d58e4e54b41e191fb24e8cc04e9d180f70d2b759d7419a675864583540e8d3

    SHA512

    6ddd7ce5ee0deb50dcdb14851ba6904240b86d4584e93dfaa09aa485d5f7f8f5197eda0314fb4661c9cfc9c1dfd9b89a499729142ab7740fc8909e0138129416

  • C:\Users\Admin\AppData\Local\Temp\IgnE32D.tmp.cmd

    Filesize

    957B

    MD5

    652df9682b9e774bb04e81d40e409573

    SHA1

    6c0461e4ef4c3a6d41cff83cf2880f80a3235e0e

    SHA256

    6846c6e1694fc6b67cb42ca1f7a5d1e7301e5c8fa61ea20f5ce0aa4fa2b4b061

    SHA512

    c38da0d6103b0edd512767ef147e70023da5dd4acda0b2654c808b46499333e850cf57d2fb9c7ba234821fdd84e544ff3cc38e1642623dcee359f78cf5424f76