Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250313-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250313-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:09

General

  • Target

    2ac1621a2b0813529021feefa223b3124176ec82974f0bc9b4b1365328e3d7d2.exe

  • Size

    1.4MB

  • MD5

    907a89ef19de4e51298eb6ef3b2ca3a0

  • SHA1

    dd9ad084860fb6582efba4cc7e14854502d288fe

  • SHA256

    2ac1621a2b0813529021feefa223b3124176ec82974f0bc9b4b1365328e3d7d2

  • SHA512

    0ddb00a707ea452eb82eb81feea604d7a4b56263009e3dbe5ce8e949e40d5e277c71b2ecc027850d3b0d421fafebdd445536050193de8a323e1a7dbd95f0a864

  • SSDEEP

    24576:M8dvIOVmW6AbPsArkueRKmV3sNlHfiqJX:MowONbkBuyKmBs7d

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2ac1621a2b0813529021feefa223b3124176ec82974f0bc9b4b1365328e3d7d2.exe
    "C:\Users\Admin\AppData\Local\Temp\2ac1621a2b0813529021feefa223b3124176ec82974f0bc9b4b1365328e3d7d2.exe"
    1⤵
    • Checks computer location settings
    • Drops startup file
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:888
      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:5188

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\app.exe

    Filesize

    1.4MB

    MD5

    79be45e04e7529700bed24b71c22c755

    SHA1

    1e40ec0861ee01e365432686b67dd7f039ea76eb

    SHA256

    41fdfe41b93802af183bb69df190669513b73e5e18609b6035ecaa9e14c3c263

    SHA512

    ff65fe953fdfcc1ec6c2fc588ea1037a85b763cfd3f4df800da98941ce0b37ab535fd5e82ea65c7a703f9bb02e79df6217b000ba367ce894ba6eeca036613ea4

  • memory/888-40-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/888-36-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/888-35-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/888-34-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/888-32-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/888-33-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-7-0x0000000074BC2000-0x0000000074BC3000-memory.dmp

    Filesize

    4KB

  • memory/3016-9-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-8-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-0-0x0000000074BC2000-0x0000000074BC3000-memory.dmp

    Filesize

    4KB

  • memory/3016-31-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-6-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-5-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-2-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/3016-1-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/5188-42-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/5188-41-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB

  • memory/5188-38-0x0000000000400000-0x000000000049A000-memory.dmp

    Filesize

    616KB

  • memory/5188-43-0x0000000074BC0000-0x0000000075171000-memory.dmp

    Filesize

    5.7MB