Analysis
-
max time kernel
128s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2023 14:39
Static task
static1
Behavioral task
behavioral1
Sample
32fa784a8dcbb3exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
32fa784a8dcbb3exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
32fa784a8dcbb3exeexeexeex.exe
-
Size
288KB
-
MD5
32fa784a8dcbb3b35b3136a19db4c4f9
-
SHA1
f38049432ac8f5d016e758aa15207b7953252b7a
-
SHA256
8051ee3aeb5d48e3971d380b409751f14010ce7f6e2506d461ff27b6a7f7cf81
-
SHA512
b412a26a751d3557309c9888bfb74354331c772fad7c509524c3db03265807637c11736e965336954f9f558bdee062f10f380502a4affc53eca4be36cdd0e884
-
SSDEEP
6144:LQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:LQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation 32fa784a8dcbb3exeexeexeex.exe -
Executes dropped EXE 2 IoCs
pid Process 2140 wlogon32.exe 1432 wlogon32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\haldriver\ = "Application" 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\haldriver\shell\open 32fa784a8dcbb3exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\haldriver\shell\runas\command\ = "\"%1\" %*" 32fa784a8dcbb3exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\haldriver\shell\runas\command\IsolatedCommand = "\"%1\" %*" 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas\command 32fa784a8dcbb3exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\haldriver\shell\open\command 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell 32fa784a8dcbb3exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\wlogon32.exe\" /START \"%1\" %*" 32fa784a8dcbb3exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas 32fa784a8dcbb3exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\haldriver\Content-Type = "application/x-msdownload" 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\haldriver\DefaultIcon 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\haldriver\shell 32fa784a8dcbb3exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\Content-Type = "application/x-msdownload" 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\DefaultIcon 32fa784a8dcbb3exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\haldriver\shell\open\command\IsolatedCommand = "\"%1\" %*" 32fa784a8dcbb3exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\haldriver 32fa784a8dcbb3exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\haldriver\DefaultIcon\ = "%1" 32fa784a8dcbb3exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\DefaultIcon\ = "%1" 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open\command 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\Local Settings 32fa784a8dcbb3exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\haldriver\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_x86_64\\wlogon32.exe\" /START \"%1\" %*" 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\haldriver\shell\runas\command 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\haldriver\shell\runas 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe 32fa784a8dcbb3exeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\shell\open 32fa784a8dcbb3exeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000_Classes\.exe\ = "haldriver" 32fa784a8dcbb3exeexeexeex.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2140 wlogon32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4484 wrote to memory of 2140 4484 32fa784a8dcbb3exeexeexeex.exe 83 PID 4484 wrote to memory of 2140 4484 32fa784a8dcbb3exeexeexeex.exe 83 PID 4484 wrote to memory of 2140 4484 32fa784a8dcbb3exeexeexeex.exe 83 PID 2140 wrote to memory of 1432 2140 wlogon32.exe 84 PID 2140 wrote to memory of 1432 2140 wlogon32.exe 84 PID 2140 wrote to memory of 1432 2140 wlogon32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\32fa784a8dcbb3exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\32fa784a8dcbb3exeexeexeex.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_x86_64\wlogon32.exe"3⤵
- Executes dropped EXE
PID:1432
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD533a35383d57b6fa976b969ee42ad9378
SHA1e289f63e17ad87e7acb49558218833ca0dcdfd2d
SHA2567780cc359c4469f80b01f94189b5e989b8ac850cd8edef4999c7a7726546675e
SHA512db80e1e0a72b1071b3290baf4cd4aad8a1aba258830b300c8d9326cbfe6fb7df3d1437ff1a0f76862fc2bec9736b94f8f652e5cd13a4a2afd2efd983094a8cb8
-
Filesize
288KB
MD533a35383d57b6fa976b969ee42ad9378
SHA1e289f63e17ad87e7acb49558218833ca0dcdfd2d
SHA2567780cc359c4469f80b01f94189b5e989b8ac850cd8edef4999c7a7726546675e
SHA512db80e1e0a72b1071b3290baf4cd4aad8a1aba258830b300c8d9326cbfe6fb7df3d1437ff1a0f76862fc2bec9736b94f8f652e5cd13a4a2afd2efd983094a8cb8
-
Filesize
288KB
MD533a35383d57b6fa976b969ee42ad9378
SHA1e289f63e17ad87e7acb49558218833ca0dcdfd2d
SHA2567780cc359c4469f80b01f94189b5e989b8ac850cd8edef4999c7a7726546675e
SHA512db80e1e0a72b1071b3290baf4cd4aad8a1aba258830b300c8d9326cbfe6fb7df3d1437ff1a0f76862fc2bec9736b94f8f652e5cd13a4a2afd2efd983094a8cb8
-
Filesize
288KB
MD533a35383d57b6fa976b969ee42ad9378
SHA1e289f63e17ad87e7acb49558218833ca0dcdfd2d
SHA2567780cc359c4469f80b01f94189b5e989b8ac850cd8edef4999c7a7726546675e
SHA512db80e1e0a72b1071b3290baf4cd4aad8a1aba258830b300c8d9326cbfe6fb7df3d1437ff1a0f76862fc2bec9736b94f8f652e5cd13a4a2afd2efd983094a8cb8