Analysis
-
max time kernel
135s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2023 12:45
Static task
static1
Behavioral task
behavioral1
Sample
Desktop227.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Desktop227.exe
Resource
win10v2004-20230220-en
General
-
Target
Desktop227.exe
-
Size
9.4MB
-
MD5
02348c4b55858ddbec3361b1b7475844
-
SHA1
6a7433553812965a526d048e705c9d5a793a89a6
-
SHA256
977c5c1258c178e8b531fb4a9af68baab3b1c0255273be9e809e2eb197276c45
-
SHA512
eb25175e9182fe5e6cb0c928c77426c1edc6262a6ea7d9beb9b8d66617ae2dadd3081821aea3759d8a4041c54250d357d2d9a1b8e63403ec7dfdbaad62fb6afc
-
SSDEEP
196608:efE81+cKrKKlCNYelY1+5y0jIMSCYIwupQgu0sEHWOly2N3t4JdheiJTn4TGCTlc:efE8XsoNY1+59jItCMuagrsgAKmbzcGt
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-144354903-2550862337-1367551827-1000\Control Panel\International\Geo\Nation Desktop227.exe -
Executes dropped EXE 1 IoCs
pid Process 2800 Install AQUASERVICE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3240 wrote to memory of 2800 3240 Desktop227.exe 82 PID 3240 wrote to memory of 2800 3240 Desktop227.exe 82 PID 3240 wrote to memory of 2800 3240 Desktop227.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\Desktop227.exe"C:\Users\Admin\AppData\Local\Temp\Desktop227.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\AIRDCB9.tmp\Install AQUASERVICE.exe"C:\Users\Admin\AppData\Local\Temp\AIRDCB9.tmp\Install AQUASERVICE.exe"2⤵
- Executes dropped EXE
PID:2800
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23B
MD5a16e7066d0ea3ad0deff5a821e8a99fa
SHA1b9cbe533284539fab37a3d00a52dd6dd3235b247
SHA2561f621d21cb9f2ab9d60b35b0ab816f39a6d10a991d000549a15a46c0c9406332
SHA512c97c201b7fc6d8da40d68a9192cac0ad89e3b20d6cfe6d2fb5ad9559ea1df520bf2a77373f32bd814fc8f76e597d4c473896e59865ea61b0ac937d05a8b31771
-
Filesize
129KB
MD5c919e548a948906b220a6bc883b4a837
SHA13bde29f595f17b1a5536799393dc8f9bdba1e35f
SHA2566fe655f6cc5285687b9eb0f64a793dcc01e9ced37e530a1c67083073c06e654e
SHA512d3f9132108169b2de8739773a51f04115957c152e2182a07f54e5656a4e1f713d98493a90cd5f918bbf2f543b48bb748effea13442b6034880073b707ea80d27
-
Filesize
129KB
MD5c919e548a948906b220a6bc883b4a837
SHA13bde29f595f17b1a5536799393dc8f9bdba1e35f
SHA2566fe655f6cc5285687b9eb0f64a793dcc01e9ced37e530a1c67083073c06e654e
SHA512d3f9132108169b2de8739773a51f04115957c152e2182a07f54e5656a4e1f713d98493a90cd5f918bbf2f543b48bb748effea13442b6034880073b707ea80d27