Analysis
-
max time kernel
153s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2023, 16:53
Static task
static1
Behavioral task
behavioral1
Sample
Latex-Split-Table-Column.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Latex-Split-Table-Column.exe
Resource
win10v2004-20230703-en
General
-
Target
Latex-Split-Table-Column.exe
-
Size
300.4MB
-
MD5
eff4dee32ca0f188b0f6ebe24799a489
-
SHA1
d3980fba6bf04a63567954fa7ce8b645fc20367c
-
SHA256
278ec8f7a0cd969ebb84e72f60f19bb6f6fd6f7268ebe68245c46e6de2a43cf1
-
SHA512
d6665b744541124d5172348a3b035f14e06594a6a5e0655e69053189a9e5f801774d8580ca06dbf322e1ab698c77f94fa94fa4b4ee150f80981bbac429bf9650
-
SSDEEP
49152:2OM9NlsVy2qjNdgk84444444444444444444444444444444444444444444444S:2f
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1722984668-1829624581-3022101259-1000\Control Panel\International\Geo\Nation Latex-Split-Table-Column.exe -
Executes dropped EXE 2 IoCs
pid Process 888 dist13142.exe 2676 NFWCHK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4864 Latex-Split-Table-Column.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4864 Latex-Split-Table-Column.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 888 dist13142.exe 888 dist13142.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 4864 wrote to memory of 888 4864 Latex-Split-Table-Column.exe 84 PID 4864 wrote to memory of 888 4864 Latex-Split-Table-Column.exe 84 PID 4864 wrote to memory of 888 4864 Latex-Split-Table-Column.exe 84 PID 888 wrote to memory of 2676 888 dist13142.exe 85 PID 888 wrote to memory of 2676 888 dist13142.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\Latex-Split-Table-Column.exe"C:\Users\Admin\AppData\Local\Temp\Latex-Split-Table-Column.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\dist13142.exe"C:\Users\Admin\AppData\Local\Temp\dist13142.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Users\Public\Documents\Wondershare\NFWCHK.exeC:\Users\Public\Documents\Wondershare\NFWCHK.exe3⤵
- Executes dropped EXE
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.6MB
MD53c932a548ae7eeb26348d9b948000f84
SHA1f77cfdaec196517518f6601d1d0a6f558c8b5d53
SHA2564e555b1b5102564811a8ecb229161201e4f11f79639a50fa70e3e9aae40973ee
SHA512e4786a23902b6e738caf827962a6208d12e95f4e853d1dad50299267c80afb167055de72e4d060174220bed4ce8cc49b2d435f80631ce21c0fe68500d1372467
-
Filesize
1.6MB
MD53c932a548ae7eeb26348d9b948000f84
SHA1f77cfdaec196517518f6601d1d0a6f558c8b5d53
SHA2564e555b1b5102564811a8ecb229161201e4f11f79639a50fa70e3e9aae40973ee
SHA512e4786a23902b6e738caf827962a6208d12e95f4e853d1dad50299267c80afb167055de72e4d060174220bed4ce8cc49b2d435f80631ce21c0fe68500d1372467
-
Filesize
1.6MB
MD53c932a548ae7eeb26348d9b948000f84
SHA1f77cfdaec196517518f6601d1d0a6f558c8b5d53
SHA2564e555b1b5102564811a8ecb229161201e4f11f79639a50fa70e3e9aae40973ee
SHA512e4786a23902b6e738caf827962a6208d12e95f4e853d1dad50299267c80afb167055de72e4d060174220bed4ce8cc49b2d435f80631ce21c0fe68500d1372467
-
Filesize
504B
MD542a0e6a804e88f20d532213eb2d69c58
SHA1ad4b0bcd04a6857f73f3642b5f5a478682a43817
SHA256315f8f9335a9b7c74e984189c2905d9ecda5fc77bce86811cfea5db71904b03b
SHA5126c0b7475229eb67830f69968ba6bde3e9e8389544ee301115e9fab9d7fcf5257daf564b2a8eebd5b5a6bf4ad34245cfa798cf83fe17c84b574be1d88e123ffa0
-
Filesize
1KB
MD504c9d7f844480cea744d83258f77a467
SHA1af55422dac5fabbecdd898dfbf432e0febbf21c8
SHA2564617d3cd33ffd266f9a543539d5c5560c0ff98805032693c589961a0af683b19
SHA512ef4f8f69bfa4edf35bf5d935a4f69f84edca517631b9496dee4c701ab02a34fa3a383f9deda60e4361356e82d3c9879a3b4cd7b600f99af6530c9d99d9329511
-
Filesize
1KB
MD504c9d7f844480cea744d83258f77a467
SHA1af55422dac5fabbecdd898dfbf432e0febbf21c8
SHA2564617d3cd33ffd266f9a543539d5c5560c0ff98805032693c589961a0af683b19
SHA512ef4f8f69bfa4edf35bf5d935a4f69f84edca517631b9496dee4c701ab02a34fa3a383f9deda60e4361356e82d3c9879a3b4cd7b600f99af6530c9d99d9329511
-
Filesize
1KB
MD504c9d7f844480cea744d83258f77a467
SHA1af55422dac5fabbecdd898dfbf432e0febbf21c8
SHA2564617d3cd33ffd266f9a543539d5c5560c0ff98805032693c589961a0af683b19
SHA512ef4f8f69bfa4edf35bf5d935a4f69f84edca517631b9496dee4c701ab02a34fa3a383f9deda60e4361356e82d3c9879a3b4cd7b600f99af6530c9d99d9329511
-
Filesize
2KB
MD59da0df0d06f0e5ddfa59923cb930a88d
SHA1002d93109b880f7af985f91daa998d786e08a8ff
SHA25623f98cb3d731932b4f712f9376829604921b9a4a24fcc12c00354e920ff5b8a1
SHA5127c4c541ad8a93c166e533ba3feb4ef173d9d62e49a6835e266cfd3c4c3101675f23cfdc51e0bb9da55c3eed9b297d8d7aeb51d9a37a03d4015f813a35a62e986
-
Filesize
6KB
MD5a2faaa8bb6288ecba6d0d8a9693711be
SHA134ba05392b34902eae9a7b75d3b1f82cea43741f
SHA256d17d91401b128d555d36afbf8e70ed466067503a7dd057d20879b7a32c0b706c
SHA51239a37303bea79e42610c9a8cbb49b4304387fd5a5e40b007690f08746cf264c6042e1682a19100c61baefe4d24102c29d6ad14eb7694ced02873cc1575df59da
-
Filesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a
-
Filesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a
-
Filesize
229B
MD5ad0967a0ab95aa7d71b3dc92b71b8f7a
SHA1ed63f517e32094c07a2c5b664ed1cab412233ab5
SHA2569c1212bc648a2533b53a2d0afcec518846d97630afb013742a9622f0df7b04fc
SHA51285766a907331f60044ec205cf345453fc3d44bfcac296ac93a12e8a752b84290dfd94f73b71de82f46f9503177d29602cbb87549f89dc61373d889b4ea26634b