Analysis

  • max time kernel
    95s
  • max time network
    96s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/01/2025, 04:38 UTC

General

  • Target

    6c24a27d176453a5590148a1cb30f9dfee090d5fe926ce72ecb76d452336a35d.exe

  • Size

    2.7MB

  • MD5

    0a433927ab55c45c8652056099da3a48

  • SHA1

    39b831bab30f39fe5d80caba62127ad1da39b139

  • SHA256

    6c24a27d176453a5590148a1cb30f9dfee090d5fe926ce72ecb76d452336a35d

  • SHA512

    9da1df06cdc5a200748713b04cf4e73038bb230398bc5f63cd509fa3997ff90718f851cd2c3f886e5795e2130867ac36fd8b391d4b1322dddb9614dd3d7022f1

  • SSDEEP

    24576:ssF6mZZcVKfIxTiEVc847flVC6faaQDbGV6eH81k6IbGD2JTu0GoZQDbGV6eH81y:fF6mw4gxeOw46fUbNecCCFbNecU

Malware Config

Signatures

  • Drops startup file 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6c24a27d176453a5590148a1cb30f9dfee090d5fe926ce72ecb76d452336a35d.exe
    "C:\Users\Admin\AppData\Local\Temp\6c24a27d176453a5590148a1cb30f9dfee090d5fe926ce72ecb76d452336a35d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:4860
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c echo on error resume next:CreateObject("WScript.Shell").Run "C:\Users\Admin\AppData\Local\Temp\6c24a27d176453a5590148a1cb30f9dfee090d5fe926ce72ecb76d452336a35d.exe",1: >"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\x.vbs"
      2⤵
      • Drops startup file
      • System Location Discovery: System Language Discovery
      PID:2208
    • C:\Users\Admin\AppData\Local\Temp\6c24a27d176453a5590148a1cb30f9dfee090d5fe926ce72ecb76d452336a35d.exe
      C:\Users\Admin\AppData\Local\Temp\6c24a27d176453a5590148a1cb30f9dfee090d5fe926ce72ecb76d452336a35d.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3968
      • C:\Users\Admin\AppData\Local\Temp\6c24a27d176453a5590148a1cb30f9dfee090d5fe926ce72ecb76d452336a35d.exe
        C:\Users\Admin\AppData\Local\Temp\6c24a27d176453a5590148a1cb30f9dfee090d5fe926ce72ecb76d452336a35d.exe
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        PID:1596
      • C:\Windows\SysWOW64\diskperf.exe
        "C:\Windows\SysWOW64\diskperf.exe"
        3⤵
          PID:1484

    Network

    • flag-us
      DNS
      209.205.72.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      209.205.72.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      69.31.126.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      69.31.126.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      7.98.22.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      7.98.22.2.in-addr.arpa
      IN PTR
      Response
      7.98.22.2.in-addr.arpa
      IN PTR
      a2-22-98-7deploystaticakamaitechnologiescom
    • flag-us
      DNS
      228.249.119.40.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      228.249.119.40.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      56.163.245.4.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      56.163.245.4.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      198.187.3.20.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      198.187.3.20.in-addr.arpa
      IN PTR
      Response
    • flag-us
      DNS
      83.210.23.2.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      83.210.23.2.in-addr.arpa
      IN PTR
      Response
      83.210.23.2.in-addr.arpa
      IN PTR
      a2-23-210-83deploystaticakamaitechnologiescom
    • flag-us
      DNS
      19.229.111.52.in-addr.arpa
      Remote address:
      8.8.8.8:53
      Request
      19.229.111.52.in-addr.arpa
      IN PTR
      Response
    No results found
    • 8.8.8.8:53
      209.205.72.20.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      209.205.72.20.in-addr.arpa

    • 8.8.8.8:53
      69.31.126.40.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      69.31.126.40.in-addr.arpa

    • 8.8.8.8:53
      7.98.22.2.in-addr.arpa
      dns
      68 B
      129 B
      1
      1

      DNS Request

      7.98.22.2.in-addr.arpa

    • 8.8.8.8:53
      228.249.119.40.in-addr.arpa
      dns
      73 B
      159 B
      1
      1

      DNS Request

      228.249.119.40.in-addr.arpa

    • 8.8.8.8:53
      56.163.245.4.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      56.163.245.4.in-addr.arpa

    • 8.8.8.8:53
      198.187.3.20.in-addr.arpa
      dns
      71 B
      157 B
      1
      1

      DNS Request

      198.187.3.20.in-addr.arpa

    • 8.8.8.8:53
      83.210.23.2.in-addr.arpa
      dns
      70 B
      133 B
      1
      1

      DNS Request

      83.210.23.2.in-addr.arpa

    • 8.8.8.8:53
      19.229.111.52.in-addr.arpa
      dns
      72 B
      158 B
      1
      1

      DNS Request

      19.229.111.52.in-addr.arpa

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1484-28-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1484-27-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1484-24-0x0000000000400000-0x0000000000412000-memory.dmp

      Filesize

      72KB

    • memory/1596-23-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1596-37-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/1596-35-0x0000000000440000-0x0000000000509000-memory.dmp

      Filesize

      804KB

    • memory/1596-18-0x0000000000400000-0x000000000043E000-memory.dmp

      Filesize

      248KB

    • memory/3968-6-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3968-13-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3968-9-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3968-7-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3968-3-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3968-14-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3968-5-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3968-10-0x00000000004E7000-0x0000000000513000-memory.dmp

      Filesize

      176KB

    • memory/3968-4-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3968-2-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3968-8-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/3968-33-0x0000000000400000-0x0000000000628000-memory.dmp

      Filesize

      2.2MB

    • memory/3968-30-0x0000000000400000-0x0000000001400000-memory.dmp

      Filesize

      16.0MB

    • memory/4860-12-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB

    • memory/4860-0-0x0000000000400000-0x0000000000445000-memory.dmp

      Filesize

      276KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.