Analysis

  • max time kernel
    104s
  • max time network
    143s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/03/2025, 01:18

General

  • Target

    EC250125AAACW-000025_document.exe

  • Size

    769KB

  • MD5

    85241ab08bc17b08e08a721d25e85e99

  • SHA1

    d975b17b2f499ef87f21fda034e5a8b64420b820

  • SHA256

    5c0d08c95aba7f1d0b0d4982586f3b87f61a9409c46a6c7cb4852b8377465f33

  • SHA512

    7586ab2d5ea88eab8bb9e39f76064bc7b1d9a6c3815a17da697bb89088399a97264e83f2c98128165c365be6c7f44a783182a7dd975fc26bf7b02c69c07a13c7

  • SSDEEP

    12288:I2m7wrTR8+n9ath/W63Y4yYUHh4B/J/MvExZQYC3:I2Wm8+d4ypB4pZMv

Malware Config

Signatures

  • Modifies Windows Defender DisableAntiSpyware settings 3 TTPs 1 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs 6 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe -k DcomLaunch -p
    1⤵
      PID:796
    • C:\Users\Admin\AppData\Local\Temp\EC250125AAACW-000025_document.exe
      "C:\Users\Admin\AppData\Local\Temp\EC250125AAACW-000025_document.exe"
      1⤵
      • Modifies Windows Defender DisableAntiSpyware settings
      • Modifies Windows Defender Real-time Protection settings
      • Checks computer location settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2460

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Desktop.exe

      Filesize

      150B

      MD5

      7f077f1fce3d566040b0d69eb1f27d8f

      SHA1

      28d9c5f6b214c5cdbe7f7e55d6ed5e82080dea01

      SHA256

      487ad0d2cf075f4328a1adf57ef428759ad4e2c873a8ebd2ad9653990829c9cf

      SHA512

      fb93af3733dfb08f18ecc4dccf2fbf035ac0be66d8abf5715d7716fe27979c349b33994055093a5dcc8852b8305cd0ac8ab468fdfdf136f2904b38256cc8d739

    • memory/796-0-0x000001C0247C0000-0x000001C0247E9000-memory.dmp

      Filesize

      164KB

    • memory/796-12-0x000001C0247C0000-0x000001C0247E9000-memory.dmp

      Filesize

      164KB