Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/03/2025, 06:13

General

  • Target

    7621266dff8a6ed77a89bf540aa04817.exe

  • Size

    690KB

  • MD5

    7621266dff8a6ed77a89bf540aa04817

  • SHA1

    667a52b0c561ec9a378706be7d5f556b44516c3c

  • SHA256

    ec8db8b10723987c0e27aed520f12d33fff005271b82660969eabf1bfbbd4441

  • SHA512

    9fe8a982bebb3f9316fdfd24f6d990625f521674e43f0dd5e14d3af18a77320d747565ed803626ef94b055c9a9442d9a36da0eda5daa7fd991f9bf38fad89f90

  • SSDEEP

    12288:n2QRXDD1yed0fsU4GSWgOvPESGj4s32xEdRCSkeA0plGImZV5SAw2izK:n2Q9NXw2/wPOjdGxY4DFwde

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7621266dff8a6ed77a89bf540aa04817.exe
    "C:\Users\Admin\AppData\Local\Temp\7621266dff8a6ed77a89bf540aa04817.exe"
    1⤵
    • Checks computer location settings
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:740
    • C:\Windows\SYSTEM32\schtasks.exe
      "schtasks.exe" /create /tn Windows Update Service /tr "C:\ProgramData\Windows Update Service\Windows Update Service.exe" /st 06:27 /du 23:59 /sc daily /ri 1 /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:1460
    • C:\ProgramData\Windows Update Service\Windows Update Service.exe
      "C:\ProgramData\Windows Update Service\Windows Update Service.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      PID:4596
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmp8462.tmp.bat""
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4652
      • C:\Windows\system32\timeout.exe
        timeout 7
        3⤵
        • Delays execution with timeout.exe
        PID:2804

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Windows Update Service\Windows Update Service.exe

    Filesize

    690KB

    MD5

    7621266dff8a6ed77a89bf540aa04817

    SHA1

    667a52b0c561ec9a378706be7d5f556b44516c3c

    SHA256

    ec8db8b10723987c0e27aed520f12d33fff005271b82660969eabf1bfbbd4441

    SHA512

    9fe8a982bebb3f9316fdfd24f6d990625f521674e43f0dd5e14d3af18a77320d747565ed803626ef94b055c9a9442d9a36da0eda5daa7fd991f9bf38fad89f90

  • C:\Users\Admin\AppData\Local\Temp\tmp8462.tmp.bat

    Filesize

    184B

    MD5

    e19aa988c1dc562b917dfe9c58921ab6

    SHA1

    0934a8920a73a61a021746ef6ad76f02f386760b

    SHA256

    955b4aa71c5a795ea313fb987f97851cdb3d476644504bef5615ec1295c599bd

    SHA512

    cafe201a148d6314d0793e222b5f9c3772862131036162d6f1d60d233950c4d5cabb1bb3c02915f18b3f471c4d9e1c5212c643a044e53654b36aee8ffc5b0403

  • memory/740-0-0x00007FFAC8083000-0x00007FFAC8085000-memory.dmp

    Filesize

    8KB

  • memory/740-1-0x0000019517190000-0x0000019517242000-memory.dmp

    Filesize

    712KB

  • memory/740-2-0x00007FFAC8080000-0x00007FFAC8B41000-memory.dmp

    Filesize

    10.8MB

  • memory/740-18-0x00007FFAC8080000-0x00007FFAC8B41000-memory.dmp

    Filesize

    10.8MB

  • memory/4596-17-0x00007FFAC8080000-0x00007FFAC8B41000-memory.dmp

    Filesize

    10.8MB

  • memory/4596-19-0x00007FFAC8080000-0x00007FFAC8B41000-memory.dmp

    Filesize

    10.8MB

  • memory/4596-21-0x00007FFAC8080000-0x00007FFAC8B41000-memory.dmp

    Filesize

    10.8MB

  • memory/4596-22-0x00007FFAC8080000-0x00007FFAC8B41000-memory.dmp

    Filesize

    10.8MB