Analysis
-
max time kernel
142s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
92b01ffa083eefexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
92b01ffa083eefexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
92b01ffa083eefexeexeexeex.exe
-
Size
327KB
-
MD5
92b01ffa083eefa04d07dcdaa6151ac7
-
SHA1
ee00de951e1a72a5b0eac16614d959f7944ef08f
-
SHA256
928506ecb9b66ce68dff03fe4ea675c0b9670b81d95f7dbab4e5271fe082b38f
-
SHA512
fa473fcdbd7116cc11d44be5a58ef3e54fc5cbe68be247bbde93db27d0db6be522501f41192b81fba099b8e3416c3764cc653decfbaa45cf430dbdda7d559fdc
-
SSDEEP
6144:C2+JS2sFafI8U0obHCW/2a7XQcsPMjVWrG8KgbPzDh:C2TFafJiHCWBWPMjVWrXK0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation 92b01ffa083eefexeexeexeex.exe -
Executes dropped EXE 2 IoCs
pid Process 3952 sidebar2.exe 2216 sidebar2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\open\command 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\open 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\sidebar2.exe\" /START \"%1\" %*" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\Content-Type = "application/x-msdownload" 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\DefaultIcon\ = "%1" 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open\command 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\open\command\IsolatedCommand = "\"%1\" %*" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\runas 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\DefaultIcon\ = "%1" 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\runas\command\ = "\"%1\" %*" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\DefaultIcon 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\Content-Type = "application/x-msdownload" 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\sidebar2.exe\" /START \"%1\" %*" 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\ = "prochost" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas\command 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\runas\command 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\ = "Application" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\DefaultIcon 92b01ffa083eefexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\prochost\shell\runas\command\IsolatedCommand = "\"%1\" %*" 92b01ffa083eefexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open 92b01ffa083eefexeexeexeex.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3952 sidebar2.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4192 wrote to memory of 3952 4192 92b01ffa083eefexeexeexeex.exe 83 PID 4192 wrote to memory of 3952 4192 92b01ffa083eefexeexeexeex.exe 83 PID 4192 wrote to memory of 3952 4192 92b01ffa083eefexeexeexeex.exe 83 PID 3952 wrote to memory of 2216 3952 sidebar2.exe 84 PID 3952 wrote to memory of 2216 3952 sidebar2.exe 84 PID 3952 wrote to memory of 2216 3952 sidebar2.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\92b01ffa083eefexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\92b01ffa083eefexeexeexeex.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\sidebar2.exe"3⤵
- Executes dropped EXE
PID:2216
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
327KB
MD588eb816a67aab4826d88ae4757ca0bab
SHA1005e9cd6d426e99e0d2e0ae0173b808f30d82fff
SHA256f48fbeab64f281cfdcbb3945162b8802e072b17192b1c4b1fa2bf695a655db3e
SHA5123a5acfda1197d6b55802007253444dba7ffe4aea88c84ab4280431384ed3caf58faf149fab4ee13f6423e1ad6aa268bb8aedf8053c14eb84d84c60f1686411cf
-
Filesize
327KB
MD588eb816a67aab4826d88ae4757ca0bab
SHA1005e9cd6d426e99e0d2e0ae0173b808f30d82fff
SHA256f48fbeab64f281cfdcbb3945162b8802e072b17192b1c4b1fa2bf695a655db3e
SHA5123a5acfda1197d6b55802007253444dba7ffe4aea88c84ab4280431384ed3caf58faf149fab4ee13f6423e1ad6aa268bb8aedf8053c14eb84d84c60f1686411cf
-
Filesize
327KB
MD588eb816a67aab4826d88ae4757ca0bab
SHA1005e9cd6d426e99e0d2e0ae0173b808f30d82fff
SHA256f48fbeab64f281cfdcbb3945162b8802e072b17192b1c4b1fa2bf695a655db3e
SHA5123a5acfda1197d6b55802007253444dba7ffe4aea88c84ab4280431384ed3caf58faf149fab4ee13f6423e1ad6aa268bb8aedf8053c14eb84d84c60f1686411cf
-
Filesize
327KB
MD588eb816a67aab4826d88ae4757ca0bab
SHA1005e9cd6d426e99e0d2e0ae0173b808f30d82fff
SHA256f48fbeab64f281cfdcbb3945162b8802e072b17192b1c4b1fa2bf695a655db3e
SHA5123a5acfda1197d6b55802007253444dba7ffe4aea88c84ab4280431384ed3caf58faf149fab4ee13f6423e1ad6aa268bb8aedf8053c14eb84d84c60f1686411cf