Analysis
-
max time kernel
142s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09-06-2023 20:41
Static task
static1
Behavioral task
behavioral1
Sample
1f3a3650639db4890a28283c7263d81e9b0aef48ebba7106acb76e76a2cf1b9b.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1f3a3650639db4890a28283c7263d81e9b0aef48ebba7106acb76e76a2cf1b9b.exe
Resource
win10v2004-20230220-en
General
-
Target
1f3a3650639db4890a28283c7263d81e9b0aef48ebba7106acb76e76a2cf1b9b.exe
-
Size
1.8MB
-
MD5
4f439160f7c725e4d8cc4869f9e36041
-
SHA1
5e6a902fe8b8245faf7e49347bd04ae2f6826fd6
-
SHA256
1f3a3650639db4890a28283c7263d81e9b0aef48ebba7106acb76e76a2cf1b9b
-
SHA512
0ee9a6f580bfd1dc794259c2e8be74fe5fda785cc9600bc93b22344d42372273e7937fe99dc37efcdd007ad98c58d04a0d2391dafad45cae7abce13e68faed34
-
SSDEEP
49152:8FwiHeiOp3Kq1qwDJEeB+thrdsWPltnZIV7y0x4AbPbmcdJ:8FwfptfDqecth/l1sPx4AbPb77
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1013461898-3711306144-4198452673-1000\Control Panel\International\Geo\Nation 1f3a3650639db4890a28283c7263d81e9b0aef48ebba7106acb76e76a2cf1b9b.exe -
Executes dropped EXE 1 IoCs
pid Process 1556 fzinst.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1556 fzinst.exe 1556 fzinst.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4628 wrote to memory of 1556 4628 1f3a3650639db4890a28283c7263d81e9b0aef48ebba7106acb76e76a2cf1b9b.exe 86 PID 4628 wrote to memory of 1556 4628 1f3a3650639db4890a28283c7263d81e9b0aef48ebba7106acb76e76a2cf1b9b.exe 86 PID 4628 wrote to memory of 1556 4628 1f3a3650639db4890a28283c7263d81e9b0aef48ebba7106acb76e76a2cf1b9b.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\1f3a3650639db4890a28283c7263d81e9b0aef48ebba7106acb76e76a2cf1b9b.exe"C:\Users\Admin\AppData\Local\Temp\1f3a3650639db4890a28283c7263d81e9b0aef48ebba7106acb76e76a2cf1b9b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\管家婆行业云平台插件包\fzinst.exe"C:\Users\Admin\AppData\Local\Temp\管家婆行业云平台插件包\fzinst.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.8MB
MD553b10eefddcbcdc03d748c0d8712fc05
SHA1502a50a6833b7ee43941134519a14a7bfb91b620
SHA256dbd951370f288b2bf02aae7d6863b5b3d3840daf43fd15d031daa7dcab746c22
SHA512d118b456e95bfc1c3249e825c0a78c6d74005d97e9aa81ebaa0057f1fd4da74ce12b9b760027021c80c00d2accdac273faf17c518694aa3cf4bc99d515b8c510
-
Filesize
7.8MB
MD553b10eefddcbcdc03d748c0d8712fc05
SHA1502a50a6833b7ee43941134519a14a7bfb91b620
SHA256dbd951370f288b2bf02aae7d6863b5b3d3840daf43fd15d031daa7dcab746c22
SHA512d118b456e95bfc1c3249e825c0a78c6d74005d97e9aa81ebaa0057f1fd4da74ce12b9b760027021c80c00d2accdac273faf17c518694aa3cf4bc99d515b8c510
-
Filesize
7.8MB
MD553b10eefddcbcdc03d748c0d8712fc05
SHA1502a50a6833b7ee43941134519a14a7bfb91b620
SHA256dbd951370f288b2bf02aae7d6863b5b3d3840daf43fd15d031daa7dcab746c22
SHA512d118b456e95bfc1c3249e825c0a78c6d74005d97e9aa81ebaa0057f1fd4da74ce12b9b760027021c80c00d2accdac273faf17c518694aa3cf4bc99d515b8c510