Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2024 08:43

General

  • Target

    f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe

  • Size

    78KB

  • MD5

    769bedaefa73efbdbb4a456f208a4250

  • SHA1

    345afffc48e5dcd99c97e6781d19bd679b033304

  • SHA256

    f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2

  • SHA512

    4e726cd3e0954ca61314f5b12105da94eefb5d130fa5e0444a2d824968e9c164aa31aba29f8083bf174f4b3b8c3e71ca5b0f49ab4f1ee72db2d7381c24ddc676

  • SSDEEP

    1536:rBWV58UAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qtt60m9/E1qv:tWV58UAtWDDILJLovbicqOq3o+nE9/l

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe
    "C:\Users\Admin\AppData\Local\Temp\f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4904
    • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
      "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hfwzlc-v.cmdline"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2568
      • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
        C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBA67.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc334B18CDE19D4066B1E37FEF1ECD2E0.TMP"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4836
    • C:\Users\Admin\AppData\Local\Temp\tmpB91E.tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmpB91E.tmp.exe" C:\Users\Admin\AppData\Local\Temp\f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe
      2⤵
      • Executes dropped EXE
      • Adds Run key to start application
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      PID:5016

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\RESBA67.tmp

    Filesize

    1KB

    MD5

    667c1feb93bdc832a52e0710b17ef8a0

    SHA1

    4e709f98b7ea74064f94dec94a9b5941eb75a3ed

    SHA256

    1953ff6c1197bf490c08ded0f1f30b9e24af406c9f47fbc19a261488dd742bb7

    SHA512

    901fbe705057f8c81a21947550a598df08833290b836bf1b1b755a34a15cc8bb72f7812b4317b16cdfff5415e03ca4976de292b6f9ac238ba6727edacfc06bdb

  • C:\Users\Admin\AppData\Local\Temp\hfwzlc-v.0.vb

    Filesize

    14KB

    MD5

    7ab432dd2348e17357ddc0dd53977d84

    SHA1

    1e0479ff182c25b8c15011d681b23ad09eff379c

    SHA256

    ed9dbb4c94b97b67e58e38195fb998ce4ffd3cc41c480c0b5ff7dddf864490f8

    SHA512

    f66ca09b50d3ee2b82d557e7329ee5fed1a57b697f7798ed13e55a19cf82ef555b5881b0dcdb1c126d2262d1edd41279c6d6dae904f3cacc6bf17fe3324faefb

  • C:\Users\Admin\AppData\Local\Temp\hfwzlc-v.cmdline

    Filesize

    266B

    MD5

    fb11a5d89ce5494cb7b8b449822a81a9

    SHA1

    dbf4e92e315e99f5d1e3fe3fd5731c31d5c6d89a

    SHA256

    e2919f0d4b218c155ab91cfffcc2e93a4352c2a99842f76fe01b18382af18566

    SHA512

    da14f1ee10024c17216efb5489c3ca59a64379ec593c2527a3d7255194347f034998000e152a3b9597d0ac20d45dfffed44d18c9f6fc469708004c90dca05b14

  • C:\Users\Admin\AppData\Local\Temp\tmpB91E.tmp.exe

    Filesize

    78KB

    MD5

    60e6f3804fc8f605b1d8f7a29c9ae8d2

    SHA1

    bcae475dc265144de2c03fb9a626a082ce99d24f

    SHA256

    eab6c8ca1933dbda715f21322dc8233513538f70805377aad38dd9d05f68f13f

    SHA512

    fd7491a4df463b2d7fb66c1bac8113da89987929d1b4084d2b737f9da96f344ad63df6a990ccad5191cb1db6784ab0ccdcdb6db1646562996d4803d86d4b2a6f

  • C:\Users\Admin\AppData\Local\Temp\vbc334B18CDE19D4066B1E37FEF1ECD2E0.TMP

    Filesize

    660B

    MD5

    fabc32497fc0eae4f2fe44ba421d1ef7

    SHA1

    120342f353ae6d7cfebcccd18b8779878a0e72cf

    SHA256

    6e0d39f3d0e764f3305d7fab4ae353a8f13b1d01b3b7ba9e39d4693619d40876

    SHA512

    d0ed7fb5537203e74adb0ec94faf4b1d80bd45bc425fd4461fe60f9c220574cda75ff07f4cc7e3a1bef49716577a8575eef76d04ce387110e410fad1fecc2624

  • C:\Users\Admin\AppData\Local\Temp\zCom.resources

    Filesize

    62KB

    MD5

    a26b0f78faa3881bb6307a944b096e91

    SHA1

    42b01830723bf07d14f3086fa83c4f74f5649368

    SHA256

    b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5

    SHA512

    a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c

  • memory/2568-8-0x0000000075540000-0x0000000075AF1000-memory.dmp

    Filesize

    5.7MB

  • memory/2568-18-0x0000000075540000-0x0000000075AF1000-memory.dmp

    Filesize

    5.7MB

  • memory/4904-0-0x0000000075542000-0x0000000075543000-memory.dmp

    Filesize

    4KB

  • memory/4904-2-0x0000000075540000-0x0000000075AF1000-memory.dmp

    Filesize

    5.7MB

  • memory/4904-1-0x0000000075540000-0x0000000075AF1000-memory.dmp

    Filesize

    5.7MB

  • memory/4904-22-0x0000000075540000-0x0000000075AF1000-memory.dmp

    Filesize

    5.7MB

  • memory/5016-23-0x0000000075540000-0x0000000075AF1000-memory.dmp

    Filesize

    5.7MB

  • memory/5016-24-0x0000000075540000-0x0000000075AF1000-memory.dmp

    Filesize

    5.7MB

  • memory/5016-25-0x0000000075540000-0x0000000075AF1000-memory.dmp

    Filesize

    5.7MB

  • memory/5016-26-0x0000000075540000-0x0000000075AF1000-memory.dmp

    Filesize

    5.7MB

  • memory/5016-27-0x0000000075540000-0x0000000075AF1000-memory.dmp

    Filesize

    5.7MB