Analysis

  • max time kernel
    142s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:11

General

  • Target

    55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe

  • Size

    3.6MB

  • MD5

    3253b2e17495ad4fa33b0caa88defd97

  • SHA1

    112eeaa584434e26a2303b9ed654b2d9feabab20

  • SHA256

    55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d

  • SHA512

    e15a08a9a16817699526111907e9b3d9ed437c3d2da7b4a83a54f395cb71403cc6805b415494aa0bd2eb753ce53021ef77e4a1153865339572bd0841aadb1d77

  • SSDEEP

    98304:i250LpLG9AVCX9Uv1k24W2xhg+rjTCYSGtS+T7OvTik:i250PVCNUdF4zxhg+HSGQ+3kT

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 5 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 5 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 4 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies registry class 5 IoCs
  • Runs ping.exe 1 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe
    "C:\Users\Admin\AppData\Local\Temp\55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Sdtk7fBZfT.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5320
      • C:\Windows\system32\chcp.com
        chcp 65001
        3⤵
          PID:4744
        • C:\Windows\system32\PING.EXE
          ping -n 10 localhost
          3⤵
          • System Network Configuration Discovery: Internet Connection Discovery
          • Runs ping.exe
          PID:4760
        • C:\Windows\Sun\Java\Deployment\csrss.exe
          "C:\Windows\Sun\Java\Deployment\csrss.exe"
          3⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Modifies registry class
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4556
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\tdcOVhdoAh.bat"
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2448
            • C:\Windows\system32\chcp.com
              chcp 65001
              5⤵
                PID:5108
              • C:\Windows\system32\PING.EXE
                ping -n 10 localhost
                5⤵
                • System Network Configuration Discovery: Internet Connection Discovery
                • Runs ping.exe
                PID:4056
              • C:\Windows\Sun\Java\Deployment\csrss.exe
                "C:\Windows\Sun\Java\Deployment\csrss.exe"
                5⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Modifies registry class
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:380
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\s4Al4mMfKa.bat"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4596
                  • C:\Windows\system32\chcp.com
                    chcp 65001
                    7⤵
                      PID:3384
                    • C:\Windows\system32\w32tm.exe
                      w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                      7⤵
                        PID:3508
                      • C:\Windows\Sun\Java\Deployment\csrss.exe
                        "C:\Windows\Sun\Java\Deployment\csrss.exe"
                        7⤵
                        • Checks computer location settings
                        • Executes dropped EXE
                        • Modifies registry class
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2716
                        • C:\Windows\System32\cmd.exe
                          "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\J8RurXaqj7.bat"
                          8⤵
                          • Suspicious use of WriteProcessMemory
                          PID:4764
                          • C:\Windows\system32\chcp.com
                            chcp 65001
                            9⤵
                              PID:1040
                            • C:\Windows\system32\PING.EXE
                              ping -n 10 localhost
                              9⤵
                              • System Network Configuration Discovery: Internet Connection Discovery
                              • Runs ping.exe
                              PID:3456
                            • C:\Windows\Sun\Java\Deployment\csrss.exe
                              "C:\Windows\Sun\Java\Deployment\csrss.exe"
                              9⤵
                              • Checks computer location settings
                              • Executes dropped EXE
                              • Modifies registry class
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:2300
                              • C:\Windows\System32\cmd.exe
                                "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\jyswAWn9wk.bat"
                                10⤵
                                • Suspicious use of WriteProcessMemory
                                PID:448
                                • C:\Windows\system32\chcp.com
                                  chcp 65001
                                  11⤵
                                    PID:4344
                                  • C:\Windows\system32\PING.EXE
                                    ping -n 10 localhost
                                    11⤵
                                    • System Network Configuration Discovery: Internet Connection Discovery
                                    • Runs ping.exe
                                    PID:4972
                                  • C:\Windows\Sun\Java\Deployment\csrss.exe
                                    "C:\Windows\Sun\Java\Deployment\csrss.exe"
                                    11⤵
                                    • Executes dropped EXE
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:4236

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Recovery\WindowsRE\Idle.exe

                Filesize

                3.6MB

                MD5

                3253b2e17495ad4fa33b0caa88defd97

                SHA1

                112eeaa584434e26a2303b9ed654b2d9feabab20

                SHA256

                55c90346c1106def94ce35242b780bd012609ce24c49a356c804a4689701af7d

                SHA512

                e15a08a9a16817699526111907e9b3d9ed437c3d2da7b4a83a54f395cb71403cc6805b415494aa0bd2eb753ce53021ef77e4a1153865339572bd0841aadb1d77

              • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\csrss.exe.log

                Filesize

                1KB

                MD5

                8ee01a9d8d8d1ecf515b687bf5e354ca

                SHA1

                c3b943dce30e425ae34e6737c7d5c3cdd92f79c5

                SHA256

                c45f52a36b283b46aae313b5a4fcbfbfb67b3c5ac4ee3ecd921087ddadb691a1

                SHA512

                6cb43253ddb3d2e5bdedcf76bc299e91ce970c6ccc53a2d9df7ba621435a6a704ce3990bdf59d939e513e609bab3daf8f110c1cca8485e1a9fe8536a67d41dda

              • C:\Users\Admin\AppData\Local\Temp\J8RurXaqj7.bat

                Filesize

                168B

                MD5

                d12c75b72ca7a226cc4a3f5f7d4ca949

                SHA1

                b6f66e2863e218c4933a9a50b0caf0ac87a9520a

                SHA256

                e46d1b19cb285441c42d97c16d3dd4c0200ff34fbff0b20e8da5a5bddcf09f3c

                SHA512

                29261c052eb403ba36c237757ee5e64183fa2ac67b04b0fd2b0db250e375c3870c780e0ea24e89bb177981de0968c5e4798b91a34f2536c9e3a188c5b578e59b

              • C:\Users\Admin\AppData\Local\Temp\Sdtk7fBZfT.bat

                Filesize

                168B

                MD5

                178a84032d31dcef58f14ba49b91c76a

                SHA1

                e2d00600aac1b6d3a8ff70291d374f3c5e0fa869

                SHA256

                116118e62860ecd23fae64e8f03237d932a5258f7ac9c13fe183a954706c2e77

                SHA512

                5bbe5bf51b1f252fc85687b3f06a61d4a7e25f12b8e6712bbc0cb4ebe5fcd8772da60ef4b79a0e3c2e222ba196d708ef386bf89e5ac3bb8ffbe0a1ace56305e3

              • C:\Users\Admin\AppData\Local\Temp\jyswAWn9wk.bat

                Filesize

                168B

                MD5

                08c92b00eca3093aade2fb40be395b74

                SHA1

                772d90341cb88b2a5949e8b848f5aa96cfde1352

                SHA256

                659bbae53ae567649c7b599f68c571a965c98e622eb489a1101a58449d1e32ff

                SHA512

                aef6918e1bec48aa400f773792b6ecf70e009a76ff6d426e005cb8418bb9f03fe8393e91baa65f3834ba5469833eabfe3d260d7a8b4a30447bd847971042f9fe

              • C:\Users\Admin\AppData\Local\Temp\s4Al4mMfKa.bat

                Filesize

                216B

                MD5

                e9ffcc0457879d659df4cfaea2bd399f

                SHA1

                8ba33df402767e1b766361abe1fc41aee9484609

                SHA256

                8ac48f811cbb1da0c628b7521d3307dd34242b6bebbaf7f5b69ce84b7a182832

                SHA512

                4b0a7bc4dbac0cc35b6997d686218c6316249aecaf3b20f28c87ef2fce171c0654e7f7351c2526ff82e557e20e814636fa89ade029e55dc7eda3d7fec602d06a

              • C:\Users\Admin\AppData\Local\Temp\tdcOVhdoAh.bat

                Filesize

                168B

                MD5

                960650debdadb6f83cb5cc6446bb94f1

                SHA1

                bad6e90815b96df5f4e557cc4fef86e8d6a46a09

                SHA256

                e3269be845be5c208e5f6162e57e5e5d4c9ca140f38e4ceeca23e7d60597ef24

                SHA512

                716fdf4a973458cbe388b1a746bde6196be7b885ba16041755a3932c63c18f3ef874bafb3b03c4233428c40cda577288bc8a3ac15c49e4e98ee1277c8add614a

              • memory/380-142-0x000000001DE70000-0x000000001DEBE000-memory.dmp

                Filesize

                312KB

              • memory/1320-39-0x000000001D120000-0x000000001D132000-memory.dmp

                Filesize

                72KB

              • memory/1320-46-0x000000001D0F0000-0x000000001D100000-memory.dmp

                Filesize

                64KB

              • memory/1320-6-0x000000001BC00000-0x000000001BC26000-memory.dmp

                Filesize

                152KB

              • memory/1320-7-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                Filesize

                10.8MB

              • memory/1320-10-0x00000000016B0000-0x00000000016BE000-memory.dmp

                Filesize

                56KB

              • memory/1320-15-0x000000001D070000-0x000000001D0C0000-memory.dmp

                Filesize

                320KB

              • memory/1320-18-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                Filesize

                10.8MB

              • memory/1320-20-0x000000001BC70000-0x000000001BC88000-memory.dmp

                Filesize

                96KB

              • memory/1320-22-0x0000000003310000-0x0000000003320000-memory.dmp

                Filesize

                64KB

              • memory/1320-23-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                Filesize

                10.8MB

              • memory/1320-17-0x0000000003300000-0x0000000003310000-memory.dmp

                Filesize

                64KB

              • memory/1320-14-0x000000001BC30000-0x000000001BC4C000-memory.dmp

                Filesize

                112KB

              • memory/1320-27-0x000000001BC60000-0x000000001BC6E000-memory.dmp

                Filesize

                56KB

              • memory/1320-30-0x000000001D0C0000-0x000000001D0D2000-memory.dmp

                Filesize

                72KB

              • memory/1320-34-0x000000001BCA0000-0x000000001BCB0000-memory.dmp

                Filesize

                64KB

              • memory/1320-35-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                Filesize

                10.8MB

              • memory/1320-37-0x000000001D100000-0x000000001D116000-memory.dmp

                Filesize

                88KB

              • memory/1320-40-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                Filesize

                10.8MB

              • memory/1320-3-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                Filesize

                10.8MB

              • memory/1320-32-0x000000001BC90000-0x000000001BC9C000-memory.dmp

                Filesize

                48KB

              • memory/1320-44-0x000000001D0E0000-0x000000001D0EE000-memory.dmp

                Filesize

                56KB

              • memory/1320-4-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                Filesize

                10.8MB

              • memory/1320-49-0x000000001D140000-0x000000001D150000-memory.dmp

                Filesize

                64KB

              • memory/1320-51-0x000000001D1B0000-0x000000001D20A000-memory.dmp

                Filesize

                360KB

              • memory/1320-47-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                Filesize

                10.8MB

              • memory/1320-55-0x000000001D160000-0x000000001D170000-memory.dmp

                Filesize

                64KB

              • memory/1320-53-0x000000001D150000-0x000000001D15E000-memory.dmp

                Filesize

                56KB

              • memory/1320-57-0x000000001D170000-0x000000001D17E000-memory.dmp

                Filesize

                56KB

              • memory/1320-42-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                Filesize

                10.8MB

              • memory/1320-59-0x000000001D410000-0x000000001D428000-memory.dmp

                Filesize

                96KB

              • memory/1320-61-0x000000001D480000-0x000000001D4CE000-memory.dmp

                Filesize

                312KB

              • memory/1320-41-0x000000001D670000-0x000000001DB98000-memory.dmp

                Filesize

                5.2MB

              • memory/1320-28-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                Filesize

                10.8MB

              • memory/1320-25-0x000000001BC50000-0x000000001BC60000-memory.dmp

                Filesize

                64KB

              • memory/1320-12-0x00000000032F0000-0x00000000032FC000-memory.dmp

                Filesize

                48KB

              • memory/1320-77-0x000000001D430000-0x000000001D47E000-memory.dmp

                Filesize

                312KB

              • memory/1320-2-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                Filesize

                10.8MB

              • memory/1320-1-0x0000000000D40000-0x00000000010D8000-memory.dmp

                Filesize

                3.6MB

              • memory/1320-79-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                Filesize

                10.8MB

              • memory/1320-8-0x00007FFBC8120000-0x00007FFBC8BE1000-memory.dmp

                Filesize

                10.8MB

              • memory/1320-0-0x00007FFBC8123000-0x00007FFBC8125000-memory.dmp

                Filesize

                8KB

              • memory/2300-202-0x000000001DCF0000-0x000000001DD3E000-memory.dmp

                Filesize

                312KB

              • memory/2716-172-0x000000001CB60000-0x000000001CBAE000-memory.dmp

                Filesize

                312KB

              • memory/4556-111-0x000000001BBB0000-0x000000001BBFE000-memory.dmp

                Filesize

                312KB