Analysis
-
max time kernel
124s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
05-07-2023 14:16
Static task
static1
Behavioral task
behavioral1
Sample
00a10654613765exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
00a10654613765exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
00a10654613765exeexeexeex.exe
-
Size
327KB
-
MD5
00a1065461376591346a37a5ecad95cf
-
SHA1
5a364c0b26344f5ebaea5ad52c93ff5cc245b39b
-
SHA256
b3b4fcae45dc3d211b899d38648751f8398574054f5af646d0c7bbe209323900
-
SHA512
c931ef99b9616b4b372ebfc093e90dafde8d769ac7f11c44d53b816f095e121018ced50dd9ccaadd462e47e1b69ad0ad6a5efc52536a54e8c748970c001f54f7
-
SSDEEP
6144:Q2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:Q2TFafJiHCWBWPMjVWrXK0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation 00a10654613765exeexeexeex.exe -
Executes dropped EXE 2 IoCs
pid Process 984 taskhostsys.exe 2764 taskhostsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\DefaultIcon\ = "%1" 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\open\command 00a10654613765exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\runas\command\IsolatedCommand = "\"%1\" %*" 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open\command 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings 00a10654613765exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\ = "Application" 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\DefaultIcon 00a10654613765exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\taskhostsys.exe\" /START \"%1\" %*" 00a10654613765exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\DefaultIcon 00a10654613765exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\open\command\IsolatedCommand = "\"%1\" %*" 00a10654613765exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\DefaultIcon\ = "%1" 00a10654613765exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\Content-Type = "application/x-msdownload" 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas\command 00a10654613765exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 00a10654613765exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\runas\command 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\runas 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open 00a10654613765exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\open 00a10654613765exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\runas\command\ = "\"%1\" %*" 00a10654613765exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\Content-Type = "application/x-msdownload" 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc 00a10654613765exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\ = "jitc" 00a10654613765exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell 00a10654613765exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\taskhostsys.exe\" /START \"%1\" %*" 00a10654613765exeexeexeex.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 984 taskhostsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2776 wrote to memory of 984 2776 00a10654613765exeexeexeex.exe 79 PID 2776 wrote to memory of 984 2776 00a10654613765exeexeexeex.exe 79 PID 2776 wrote to memory of 984 2776 00a10654613765exeexeexeex.exe 79 PID 984 wrote to memory of 2764 984 taskhostsys.exe 80 PID 984 wrote to memory of 2764 984 taskhostsys.exe 80 PID 984 wrote to memory of 2764 984 taskhostsys.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\00a10654613765exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\00a10654613765exeexeexeex.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\taskhostsys.exe"3⤵
- Executes dropped EXE
PID:2764
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD586d255c821440c7429582bce499d4f39
SHA1925108ed4189345d423af46ed01e193413e87b60
SHA2562003e346a6b219609bd78bc5bf682b5feb699855656569071a1f02765bca0add
SHA512bce053973ba269a9844feb39c93c74d2e853411c11b5745bd5096f3dc9dc1794545c72f0c2a8dbbbf29b6e0dc8d68bd7ef9fa7d835d4c947e05c2a1bb560b1e2
-
Filesize
327KB
MD586d255c821440c7429582bce499d4f39
SHA1925108ed4189345d423af46ed01e193413e87b60
SHA2562003e346a6b219609bd78bc5bf682b5feb699855656569071a1f02765bca0add
SHA512bce053973ba269a9844feb39c93c74d2e853411c11b5745bd5096f3dc9dc1794545c72f0c2a8dbbbf29b6e0dc8d68bd7ef9fa7d835d4c947e05c2a1bb560b1e2
-
Filesize
327KB
MD586d255c821440c7429582bce499d4f39
SHA1925108ed4189345d423af46ed01e193413e87b60
SHA2562003e346a6b219609bd78bc5bf682b5feb699855656569071a1f02765bca0add
SHA512bce053973ba269a9844feb39c93c74d2e853411c11b5745bd5096f3dc9dc1794545c72f0c2a8dbbbf29b6e0dc8d68bd7ef9fa7d835d4c947e05c2a1bb560b1e2
-
Filesize
327KB
MD586d255c821440c7429582bce499d4f39
SHA1925108ed4189345d423af46ed01e193413e87b60
SHA2562003e346a6b219609bd78bc5bf682b5feb699855656569071a1f02765bca0add
SHA512bce053973ba269a9844feb39c93c74d2e853411c11b5745bd5096f3dc9dc1794545c72f0c2a8dbbbf29b6e0dc8d68bd7ef9fa7d835d4c947e05c2a1bb560b1e2