Analysis
-
max time kernel
295s -
max time network
358s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
06-05-2023 20:17
Static task
static1
Behavioral task
behavioral1
Sample
06255d7759a09d841d70703cb782e0f2972d726fe1ba7fc4617513c6e108753e.bin.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
06255d7759a09d841d70703cb782e0f2972d726fe1ba7fc4617513c6e108753e.bin.exe
Resource
win10v2004-20230221-en
General
-
Target
06255d7759a09d841d70703cb782e0f2972d726fe1ba7fc4617513c6e108753e.bin.exe
-
Size
1.2MB
-
MD5
0e0e4ff946e1bcb3125cd65e166bc873
-
SHA1
fd349ec9ca729b723f630e23ab043964e48b7ad3
-
SHA256
06255d7759a09d841d70703cb782e0f2972d726fe1ba7fc4617513c6e108753e
-
SHA512
90a42216c84e193c6d14cd9f4d0bf5f11e5b6b6967aaabb2b5aa7d865fdbc1d0d5411713b156c5f64d719c1f9a6b3260bcccf48acdb002c595cd6b0a64781698
-
SSDEEP
24576:pylNXVX5ZOunLVcXcIbTBC+HAmpR9ZHkrbURdPeZ3cqVRAA7IeMWOhLlx9o:clOuLVIcIHJAmP4QetJDIeMPhLD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
s28504418.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Control Panel\International\Geo\Nation s28504418.exe -
Executes dropped EXE 4 IoCs
Processes:
z15008654.exez41370786.exez94653735.exes28504418.exepid process 2536 z15008654.exe 2540 z41370786.exe 900 z94653735.exe 3380 s28504418.exe -
Adds Run key to start application 2 TTPs 8 IoCs
Processes:
z15008654.exez41370786.exez94653735.exe06255d7759a09d841d70703cb782e0f2972d726fe1ba7fc4617513c6e108753e.bin.exedescription ioc process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z15008654.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z15008654.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z41370786.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z41370786.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce z94653735.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z94653735.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce 06255d7759a09d841d70703cb782e0f2972d726fe1ba7fc4617513c6e108753e.bin.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 06255d7759a09d841d70703cb782e0f2972d726fe1ba7fc4617513c6e108753e.bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
s28504418.exedescription pid process Token: SeDebugPrivilege 3380 s28504418.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
06255d7759a09d841d70703cb782e0f2972d726fe1ba7fc4617513c6e108753e.bin.exez15008654.exez41370786.exez94653735.exedescription pid process target process PID 1824 wrote to memory of 2536 1824 06255d7759a09d841d70703cb782e0f2972d726fe1ba7fc4617513c6e108753e.bin.exe z15008654.exe PID 1824 wrote to memory of 2536 1824 06255d7759a09d841d70703cb782e0f2972d726fe1ba7fc4617513c6e108753e.bin.exe z15008654.exe PID 1824 wrote to memory of 2536 1824 06255d7759a09d841d70703cb782e0f2972d726fe1ba7fc4617513c6e108753e.bin.exe z15008654.exe PID 2536 wrote to memory of 2540 2536 z15008654.exe z41370786.exe PID 2536 wrote to memory of 2540 2536 z15008654.exe z41370786.exe PID 2536 wrote to memory of 2540 2536 z15008654.exe z41370786.exe PID 2540 wrote to memory of 900 2540 z41370786.exe z94653735.exe PID 2540 wrote to memory of 900 2540 z41370786.exe z94653735.exe PID 2540 wrote to memory of 900 2540 z41370786.exe z94653735.exe PID 900 wrote to memory of 3380 900 z94653735.exe s28504418.exe PID 900 wrote to memory of 3380 900 z94653735.exe s28504418.exe PID 900 wrote to memory of 3380 900 z94653735.exe s28504418.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\06255d7759a09d841d70703cb782e0f2972d726fe1ba7fc4617513c6e108753e.bin.exe"C:\Users\Admin\AppData\Local\Temp\06255d7759a09d841d70703cb782e0f2972d726fe1ba7fc4617513c6e108753e.bin.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z15008654.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z15008654.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z41370786.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z41370786.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z94653735.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z94653735.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s28504418.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\s28504418.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3380
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5554c9f13b060b5293459db22bf162876
SHA1dc6537fb0515d563804a48b0990c666cc91d8a9e
SHA2561936564f50b48a794379117627dac8f4db323a78fe8a9128d95463fbc7288758
SHA51244b34c8977000eb3af75ec51b2c84443b462b933c1b766b1643c8db472e1177877b6a01b167422dcb2184276a50facb5c6f1a3d17b9ec9891c3ad2d94392caaf
-
Filesize
1.0MB
MD5554c9f13b060b5293459db22bf162876
SHA1dc6537fb0515d563804a48b0990c666cc91d8a9e
SHA2561936564f50b48a794379117627dac8f4db323a78fe8a9128d95463fbc7288758
SHA51244b34c8977000eb3af75ec51b2c84443b462b933c1b766b1643c8db472e1177877b6a01b167422dcb2184276a50facb5c6f1a3d17b9ec9891c3ad2d94392caaf
-
Filesize
761KB
MD5eb55278703a5b9f7d4994b683207575a
SHA14c336696783168626753c68fafa48cc1af83598f
SHA256126d6659b3a70809b5ee90ce9046dc6f5d490cc44d03d5af153fa7f87b363677
SHA51283b06af167d444489808ab05a93f803f22829b75ea87feb8350905ddcae6153a9fd4d477c7e63492e848464c102749f9eeafaa4c859f0b021681aed7b1d90821
-
Filesize
761KB
MD5eb55278703a5b9f7d4994b683207575a
SHA14c336696783168626753c68fafa48cc1af83598f
SHA256126d6659b3a70809b5ee90ce9046dc6f5d490cc44d03d5af153fa7f87b363677
SHA51283b06af167d444489808ab05a93f803f22829b75ea87feb8350905ddcae6153a9fd4d477c7e63492e848464c102749f9eeafaa4c859f0b021681aed7b1d90821
-
Filesize
578KB
MD5e561a41462955b0e152aed25026975d5
SHA14832535dc5a7d67a1f955f511580a1737ba79769
SHA2567abe7bbe775ff3bf8d8d853cf7d20f66882604ebd2f6f3e0d294a1b6f4896122
SHA512ee65b34e8b3ad3e271cac981f0a8b72bb6bc53dca40ac29f5b45a4da0fd0e850d03a4f05e269e7257a2c076f0cfc24bf394447e660e131278bd2394d0450e5bc
-
Filesize
578KB
MD5e561a41462955b0e152aed25026975d5
SHA14832535dc5a7d67a1f955f511580a1737ba79769
SHA2567abe7bbe775ff3bf8d8d853cf7d20f66882604ebd2f6f3e0d294a1b6f4896122
SHA512ee65b34e8b3ad3e271cac981f0a8b72bb6bc53dca40ac29f5b45a4da0fd0e850d03a4f05e269e7257a2c076f0cfc24bf394447e660e131278bd2394d0450e5bc
-
Filesize
502KB
MD51da26faab3d6bcc76efb9d47c1d19388
SHA1c048d05ee6b773509ea5bf13c4ff0143548c5cec
SHA256d7f52043d39347f7b52a2d959b1fb5e4381dbf4976de37474f319a3fa974f1e1
SHA5129726bfcf089b4c9f133bdfbbf8b3b524be776cde5061a21893cfdd0f2493392620a47188d2662d6c653e167b1b902953e1ddc428b141660cfa740d397dcfbf61
-
Filesize
502KB
MD51da26faab3d6bcc76efb9d47c1d19388
SHA1c048d05ee6b773509ea5bf13c4ff0143548c5cec
SHA256d7f52043d39347f7b52a2d959b1fb5e4381dbf4976de37474f319a3fa974f1e1
SHA5129726bfcf089b4c9f133bdfbbf8b3b524be776cde5061a21893cfdd0f2493392620a47188d2662d6c653e167b1b902953e1ddc428b141660cfa740d397dcfbf61
-
Filesize
168KB
MD5f16fb63d4e551d3808e8f01f2671b57e
SHA1781153ad6235a1152da112de1fb39a6f2d063575
SHA2568a34627d2a802a7222661926a21bfe7e05835d8dca23459a50c62ccac4619581
SHA512fad96ade34ff0637238ebf22941dcf21d9ddbe41e10b04d32a904c6018e0c9914345fc86e0ef8c27b95e3813eb60af233b2e47a585c150b9d1c14d48906f78cf