Analysis

  • max time kernel
    108s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-12-2024 13:39

Errors

Reason
Machine shutdown

General

  • Target

    123.exe

  • Size

    93KB

  • MD5

    b4378a070bfed34faa41bcafe7a876b7

  • SHA1

    4129b0e4742f0713d8e264f34272dcd2e560305e

  • SHA256

    585137c99c22cd0b08e725b6f995a85a233ae31b118e30486bfbf2bb98d39a0e

  • SHA512

    e33547a869ba9aea236ed664bf1f69d75e9c260c9392deb413dd6137703358f5f633286e443d5ab8c1fb8286cc3003f17fdad7c0a1939ba93d415d731ff76b1a

  • SSDEEP

    1536:wdwC+xhUa9urgOBPRNvM4jEwzGi1dDlDMgS:wdmUa9urgObdGi1dZl

Malware Config

Signatures

  • Modifies Windows Firewall 2 TTPs 3 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 9 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 12 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\123.exe
    "C:\Users\Admin\AppData\Local\Temp\123.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\server.exe
      "C:\Users\Admin\AppData\Local\Temp\server.exe"
      2⤵
      • Checks computer location settings
      • Drops startup file
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: GetForegroundWindowSpam
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3100
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:3560
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall delete allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe"
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:2728
      • C:\Windows\SysWOW64\netsh.exe
        netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\server.exe" "server.exe" ENABLE
        3⤵
        • Modifies Windows Firewall
        • Event Triggered Execution: Netsh Helper DLL
        • System Location Discovery: System Language Discovery
        PID:3120
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp7FA6.tmp.BAT" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2336
        • C:\Windows\SysWOW64\shutdown.exe
          shutdown -s -t 1
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4388
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8033.tmp.BAT" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2084
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8073.tmp.BAT" "
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3364
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32 USER32.DLL,SwapMouseButton
          4⤵
          • System Location Discovery: System Language Discovery
          PID:3492
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8101.tmp.BAT" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1940
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp815F.tmp.BAT" "
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2076
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x4 /state0:0xa38c5855 /state1:0x41c64e6d
    1⤵
    • Modifies data under HKEY_USERS
    • Suspicious use of SetWindowsHookEx
    PID:4512

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\server.exe

    Filesize

    93KB

    MD5

    b4378a070bfed34faa41bcafe7a876b7

    SHA1

    4129b0e4742f0713d8e264f34272dcd2e560305e

    SHA256

    585137c99c22cd0b08e725b6f995a85a233ae31b118e30486bfbf2bb98d39a0e

    SHA512

    e33547a869ba9aea236ed664bf1f69d75e9c260c9392deb413dd6137703358f5f633286e443d5ab8c1fb8286cc3003f17fdad7c0a1939ba93d415d731ff76b1a

  • C:\Users\Admin\AppData\Local\Temp\tmp7FA6.tmp.BAT

    Filesize

    37B

    MD5

    1cbc3a2f81d4259e3bf61249711fec81

    SHA1

    7ba62560df466c6dcd794854a25aeb5b088968d8

    SHA256

    6a207f770478d59da0d2aa43a9719ef05b3f85c8c700400746ca3ab0463d08f0

    SHA512

    74ba85a391d769686c95001af6e29f9fe2ccaa4d119247fac31e65c8becda7be1ea9fa3eb9f2a06c1d48ac4b580ad8e63c14e06d94e8dd07b26129df7f1f4bc0

  • C:\Users\Admin\AppData\Local\Temp\tmp8033.tmp.BAT

    Filesize

    183B

    MD5

    ab45b6913751e20d60d6c9a44a229a66

    SHA1

    fbf98231ced1c5667bb8b83114ca2f83b044698f

    SHA256

    71385e3fb017bb452466ab1ad8764950c14a7af856d0ee8c147cf8f7f073b2ec

    SHA512

    b462bd82a58ff51d3351ae5168028439fe3dbfbaeb2465c8b300419fb5d9115eb2091aa6fe4e11cf30ba9ee37e3ef175211e5053d6fc7a3398deace787180f4e

  • C:\Users\Admin\AppData\Local\Temp\tmp8073.tmp.BAT

    Filesize

    67B

    MD5

    1cc401169ef8cf1e8977f4e92dfe72c7

    SHA1

    d04c32295d4e563978fa0abb1b32ba52699cb08d

    SHA256

    32c699ebb7394ddb2d56f092ef10fde4d9f4bcf808dbe11bad777e7bc73f7aae

    SHA512

    076eb06d9fbf8bf1d6a4c5043d803ee7b5cf0307253de6358f8ea70e0bf240f5ae2208fbe9a44778e782e29c54751936f393ade6e292064d2134ed223506866b

  • C:\Users\Admin\AppData\Local\Temp\tmp8101.tmp.BAT

    Filesize

    83B

    MD5

    cc795c9c4a83aa1ede067f96f1eb8d15

    SHA1

    32b8e1c43787353f7d87514e279288aff5f7d4f6

    SHA256

    37d23694738615464be8a3234bcc59592987432c8863db67e30385b8bb3ef450

    SHA512

    ec0b8f6600b2b0443ea6f271fcf16804e380b6f51f3f74997dc5c53ed28ece8ece58a12686b451532ed31941a67fa075305314fba7fa8555a7fb8cf6424c6fc5

  • C:\Users\Admin\AppData\Local\Temp\tmp815F.tmp.BAT

    Filesize

    76B

    MD5

    18dc60bfb068d99a80fd22499ec5f252

    SHA1

    4939c87a7ff6456971aa4baf517646d3df2a7710

    SHA256

    3be1adc56cfae9722bfa25df2ed2b112349b7aa4d8088cbf694e560dd9e53817

    SHA512

    890ba3a69f516df93154b7534f2530a5004f9d6ccc01e4f59a434e4c2c49912cc2630d34afcb24a60208173a089b8934ace4acad4cc587d21988a150d9ad32e3

  • C:\Users\Admin\AppData\Roaming\app

    Filesize

    5B

    MD5

    d43c5b07c128b116b7bc8faf7b8efa9d

    SHA1

    dd3540ad4ae14b21b665d108cf4570c2dfa6a6fa

    SHA256

    80ad1cc7b3a784dad618a445af0c8cf3efa903f82a814756f2aaa7b57f45791f

    SHA512

    618b01e2b808e1954d011635dfdf63bc75855145208fc5cae33ce09c7e5b43cf978f6511beb311765e6920e728a290c9f9ced7563e40e8ff8d093d50fdc18334

  • memory/3056-1-0x0000000075300000-0x00000000758B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3056-13-0x0000000075300000-0x00000000758B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3056-2-0x0000000075300000-0x00000000758B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3056-0-0x0000000075302000-0x0000000075303000-memory.dmp

    Filesize

    4KB

  • memory/3100-15-0x0000000075300000-0x00000000758B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3100-29-0x0000000075300000-0x00000000758B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3100-14-0x0000000075300000-0x00000000758B1000-memory.dmp

    Filesize

    5.7MB

  • memory/3100-50-0x0000000075300000-0x00000000758B1000-memory.dmp

    Filesize

    5.7MB