Analysis
-
max time kernel
144s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
17/06/2023, 01:06
Static task
static1
Behavioral task
behavioral1
Sample
4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe
Resource
win10v2004-20230220-en
General
-
Target
4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe
-
Size
871KB
-
MD5
227eec77c6eda60a64c4e5b51d5e51f6
-
SHA1
5eaeb77a0e804c062a314cb8c70abaa5d16feba3
-
SHA256
4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d
-
SHA512
cb0a83611281291cddb10eec56140d5aad4be900953057bf8c4580f256085b2ced9d990ab309cfda40d661831b810013df027ca1857ceafff2cd588eec1dbfd8
-
SSDEEP
24576:BgG1tCueii9iiBjUQE5JzXehReI5Pgbng:BgqtCDiNiBAHiReSPgk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1675742406-747946869-1029867430-1000\Control Panel\International\Geo\Nation 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4872 set thread context of 4500 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 91 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1304 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 3392 powershell.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 3392 powershell.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe 4500 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe Token: SeDebugPrivilege 3392 powershell.exe Token: SeDebugPrivilege 4500 RegSvcs.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4872 wrote to memory of 3392 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 87 PID 4872 wrote to memory of 3392 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 87 PID 4872 wrote to memory of 3392 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 87 PID 4872 wrote to memory of 1304 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 89 PID 4872 wrote to memory of 1304 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 89 PID 4872 wrote to memory of 1304 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 89 PID 4872 wrote to memory of 4500 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 91 PID 4872 wrote to memory of 4500 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 91 PID 4872 wrote to memory of 4500 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 91 PID 4872 wrote to memory of 4500 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 91 PID 4872 wrote to memory of 4500 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 91 PID 4872 wrote to memory of 4500 4872 4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe"C:\Users\Admin\AppData\Local\Temp\4e8d1df344f5009ab35ebb5fed59649cce3e0a9b7f27f312a7cc854eb74b889d.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\EiiSSvUctTst.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3392
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EiiSSvUctTst" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2616.tmp"2⤵
- Creates scheduled task(s)
PID:1304
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4500
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD52192db2c332ef9c302fbe12ab3e7dfae
SHA1a618c1af0c4440d614e9b146803a0117a2748e0a
SHA256a3e41254eeacc86e5178f68f15b127cbb6cebb8811d3ec8f913c06b3c0e9a585
SHA512764f2feea8289a3e666056289bdf472079d033bdbec9b66d909b11e7f67b3409457b926ef416be64a7dad162ec24a9d77ed2216c0bb54ad807f5a8fce6d8956f