Analysis
-
max time kernel
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2023 09:47
Static task
static1
Behavioral task
behavioral1
Sample
c48c1d65bf3e58d5dc4b9876db6da4d90e93ca74b4b51cd35c7b7400d691c182.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
c48c1d65bf3e58d5dc4b9876db6da4d90e93ca74b4b51cd35c7b7400d691c182.exe
Resource
win10v2004-20230703-en
General
-
Target
c48c1d65bf3e58d5dc4b9876db6da4d90e93ca74b4b51cd35c7b7400d691c182.exe
-
Size
1.1MB
-
MD5
83804c210ecdae26f284783ae9ed4cd0
-
SHA1
6f2d34c95b6d4313074ff8111ebbe27ab76fdb70
-
SHA256
c48c1d65bf3e58d5dc4b9876db6da4d90e93ca74b4b51cd35c7b7400d691c182
-
SHA512
163f981bdd618ce00f85dd00aa31e04ce972f9004a1e26f65251fb044c4e371b34f4c6dc3de904e0c2e69e3b01b9916923fb904ab29e625476b65f83aaad0f0a
-
SSDEEP
24576:wTbBv5rUk0FHSdWGawARX8l45tHwoD9sfBnX7SWXMdAfRd//PA:iB3aydWZRX8l45tHwoDaRXPMUlA
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation RegSvcs.exe Key value queried \REGISTRY\USER\S-1-5-21-1498570331-2313266200-788959944-1000\Control Panel\International\Geo\Nation c48c1d65bf3e58d5dc4b9876db6da4d90e93ca74b4b51cd35c7b7400d691c182.exe -
Executes dropped EXE 3 IoCs
pid Process 2956 rehir.bmp 3980 RegSvcs.exe 852 RegSvcs.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run rehir.bmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WindowsUpdate = "0\\uabt\\rehir.bmp 0\\uabt\\fgbd.xml" rehir.bmp -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2956 set thread context of 3980 2956 rehir.bmp 90 PID 2956 set thread context of 852 2956 rehir.bmp 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2496 ipconfig.exe 2348 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 852 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe 3980 RegSvcs.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3980 RegSvcs.exe Token: SeDebugPrivilege 852 RegSvcs.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1932 wrote to memory of 3476 1932 c48c1d65bf3e58d5dc4b9876db6da4d90e93ca74b4b51cd35c7b7400d691c182.exe 79 PID 1932 wrote to memory of 3476 1932 c48c1d65bf3e58d5dc4b9876db6da4d90e93ca74b4b51cd35c7b7400d691c182.exe 79 PID 1932 wrote to memory of 3476 1932 c48c1d65bf3e58d5dc4b9876db6da4d90e93ca74b4b51cd35c7b7400d691c182.exe 79 PID 3476 wrote to memory of 4888 3476 wscript.exe 80 PID 3476 wrote to memory of 4888 3476 wscript.exe 80 PID 3476 wrote to memory of 4888 3476 wscript.exe 80 PID 3476 wrote to memory of 3684 3476 wscript.exe 81 PID 3476 wrote to memory of 3684 3476 wscript.exe 81 PID 3476 wrote to memory of 3684 3476 wscript.exe 81 PID 4888 wrote to memory of 2496 4888 cmd.exe 84 PID 4888 wrote to memory of 2496 4888 cmd.exe 84 PID 4888 wrote to memory of 2496 4888 cmd.exe 84 PID 3684 wrote to memory of 2956 3684 cmd.exe 85 PID 3684 wrote to memory of 2956 3684 cmd.exe 85 PID 3684 wrote to memory of 2956 3684 cmd.exe 85 PID 3476 wrote to memory of 1568 3476 wscript.exe 86 PID 3476 wrote to memory of 1568 3476 wscript.exe 86 PID 3476 wrote to memory of 1568 3476 wscript.exe 86 PID 1568 wrote to memory of 2348 1568 cmd.exe 88 PID 1568 wrote to memory of 2348 1568 cmd.exe 88 PID 1568 wrote to memory of 2348 1568 cmd.exe 88 PID 2956 wrote to memory of 852 2956 rehir.bmp 89 PID 2956 wrote to memory of 852 2956 rehir.bmp 89 PID 2956 wrote to memory of 852 2956 rehir.bmp 89 PID 2956 wrote to memory of 3980 2956 rehir.bmp 90 PID 2956 wrote to memory of 3980 2956 rehir.bmp 90 PID 2956 wrote to memory of 3980 2956 rehir.bmp 90 PID 2956 wrote to memory of 3980 2956 rehir.bmp 90 PID 2956 wrote to memory of 3980 2956 rehir.bmp 90 PID 2956 wrote to memory of 3980 2956 rehir.bmp 90 PID 2956 wrote to memory of 852 2956 rehir.bmp 89 PID 2956 wrote to memory of 852 2956 rehir.bmp 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c48c1d65bf3e58d5dc4b9876db6da4d90e93ca74b4b51cd35c7b7400d691c182.exe"C:\Users\Admin\AppData\Local\Temp\c48c1d65bf3e58d5dc4b9876db6da4d90e93ca74b4b51cd35c7b7400d691c182.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\wscript.exe"C:\Windows\System32\wscript.exe" cjn.vbe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /release3⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release4⤵
- Gathers network information
PID:2496
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c rehir.bmp fgbd.xml3⤵
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rehir.bmprehir.bmp fgbd.xml4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:852
-
-
C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3980
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ipconfig /renew3⤵
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew4⤵
- Gathers network information
PID:2348
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365KB
MD5818a00c426a585e001d6419bb89ec5be
SHA15b5eee5176671b94d89fbdcf27d15e94cba57384
SHA2563b18e4ba7c2940ad5d2823fd3018ecffde16f90ba42adfe15f88f049981d43c4
SHA51247a4bd661345eb27dfe186d6d63b464bd7ae7fafb83c45762196a5e8780171d6495436d6115437d7a399502c320226c44eee5d4391cf075c5ef45896b69d6cde
-
Filesize
32KB
MD5117a1a3967552259fb9d8a74bda44aa1
SHA1ea3302d955d62d293012d0878c3bc72bfcafd1f2
SHA2560d14bc164111e7e33c68219a5363296331d21df5d72be18fcd02687c5a535004
SHA512dba9ef77d86e54df3e8555f4f18292386d0a306e7ceab0c64271107115a0be35d6827aed813a4b2a5c4a125cf70974444967d01816b15daff083ecc9ba76463c
-
Filesize
40KB
MD5c0885afd0acfe90b243ce6ffb39c5e1f
SHA170a78552df1e677b1b8b40707d24cced5dc2507d
SHA2565f4adf4f563a94ebed12afcc47583b0f8fac74b096e184b3eadc8a6f29e907b7
SHA512e296efb8eeafce6a6dda44a309c535e5a5747ac7755643284ae30dd02cf5a24aa7c1f072c6791480b243f38822f611bf10ca66baa6bd27b2f32ffaaea256329c
-
Filesize
99.8MB
MD54363a4964923969173f474bbc64d1d36
SHA1a689fadd583b2b768cf0de495db3003396f32791
SHA256d8f5866180aee6bee958ec2c600a174c78929438271e7a1065a1a351fc724165
SHA51204fe8985dd4a3b9d6c368b8dc5a921a53954d357038f4b7b66e62dd4d00885a2c6eb9905a1155c9724b99b08aea0352684179c4d85b1a904dcb29920dae7f37f
-
Filesize
904KB
MD570c3c7ddd6e67d2cef1c6bd67aac07ff
SHA1b44d39719c9fcc4042f3975592e0a90ff9041b21
SHA256b36028b56aa20a01e91a18f485895759cb1bf2c0e19af029c90bc3ec7fd25ea4
SHA512e3b977d251ab54d97d41c198e26798150b4e35fe2744b3949da9b2c151ed29dc6d1883f441cb9fe6be9369420bcca16e1aefdc1b4fce4860630a4b8a51e520c9
-
Filesize
904KB
MD570c3c7ddd6e67d2cef1c6bd67aac07ff
SHA1b44d39719c9fcc4042f3975592e0a90ff9041b21
SHA256b36028b56aa20a01e91a18f485895759cb1bf2c0e19af029c90bc3ec7fd25ea4
SHA512e3b977d251ab54d97d41c198e26798150b4e35fe2744b3949da9b2c151ed29dc6d1883f441cb9fe6be9369420bcca16e1aefdc1b4fce4860630a4b8a51e520c9
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b
-
Filesize
44KB
MD59d352bc46709f0cb5ec974633a0c3c94
SHA11969771b2f022f9a86d77ac4d4d239becdf08d07
SHA2562c1eeb7097023c784c2bd040a2005a5070ed6f3a4abf13929377a9e39fab1390
SHA51213c714244ec56beeb202279e4109d59c2a43c3cf29f90a374a751c04fd472b45228ca5a0178f41109ed863dbd34e0879e4a21f5e38ae3d89559c57e6be990a9b