Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09-07-2023 17:01
Static task
static1
Behavioral task
behavioral1
Sample
b9eae9250c31acexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
b9eae9250c31acexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
b9eae9250c31acexeexeexeex.exe
-
Size
288KB
-
MD5
b9eae9250c31acb967c38beefa3e61a0
-
SHA1
cf274797fc25243cc2eb67b375847a7710f18027
-
SHA256
4580b172af2daef110ed5ae23849ff3a43f8a704c5ddb75f7f5739f45ba83cfe
-
SHA512
5a1fc87bc1792aee844c0c77261b99e58006f0450e258fbff65aba2a11ea56d1078a7fbaccb0487de1a41e506a3409ec1fcb06ad4c154907b88973ae49554f53
-
SSDEEP
6144:OQ+Tyfx4NF67Sbq2nW82X45gc3BaLZVS0mOoC8zbzDie:OQMyfmNFHfnWfhLZVHmOog
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation b9eae9250c31acexeexeexeex.exe -
Executes dropped EXE 2 IoCs
pid Process 3972 lsassys.exe 652 lsassys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\halnt\shell\open\command b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\.exe\shell\open\command b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\.exe\shell\open b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\halnt b9eae9250c31acexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\halnt\ = "Application" b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\halnt\shell\runas b9eae9250c31acexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\halnt\shell\runas\command\IsolatedCommand = "\"%1\" %*" b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\.exe\shell\runas b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\halnt\DefaultIcon b9eae9250c31acexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\halnt\shell\runas\command\ = "\"%1\" %*" b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\.exe b9eae9250c31acexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\lsassys.exe\" /START \"%1\" %*" b9eae9250c31acexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" b9eae9250c31acexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\halnt\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Posix\\lsassys.exe\" /START \"%1\" %*" b9eae9250c31acexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\.exe\DefaultIcon\ = "%1" b9eae9250c31acexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\Local Settings b9eae9250c31acexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\halnt\DefaultIcon\ = "%1" b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\halnt\shell b9eae9250c31acexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\halnt\shell\open\command\IsolatedCommand = "\"%1\" %*" b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\.exe\shell\runas\command b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\halnt\shell\open b9eae9250c31acexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\.exe\ = "halnt" b9eae9250c31acexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\.exe\Content-Type = "application/x-msdownload" b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\.exe\shell b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b9eae9250c31acexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\halnt\Content-Type = "application/x-msdownload" b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\halnt\shell\runas\command b9eae9250c31acexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\.exe\DefaultIcon b9eae9250c31acexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" b9eae9250c31acexeexeexeex.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3972 lsassys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1368 wrote to memory of 3972 1368 b9eae9250c31acexeexeexeex.exe 84 PID 1368 wrote to memory of 3972 1368 b9eae9250c31acexeexeexeex.exe 84 PID 1368 wrote to memory of 3972 1368 b9eae9250c31acexeexeexeex.exe 84 PID 3972 wrote to memory of 652 3972 lsassys.exe 85 PID 3972 wrote to memory of 652 3972 lsassys.exe 85 PID 3972 wrote to memory of 652 3972 lsassys.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9eae9250c31acexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\b9eae9250c31acexeexeexeex.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Posix\lsassys.exe"3⤵
- Executes dropped EXE
PID:652
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD5df42d33b30b8803a5349608cc89feca8
SHA171be07f65a7df7f069d2d3eacf091eba929d8cf9
SHA256a9a454449e9914725e5e9884f42dac4df530b7333519d68723c628228c0f48cf
SHA512809bce8d12445ac5765db60f1516d6adaa65d5433d882647cf4d0954b1d70b337324fce23ff5319d14d5552244b66ab91ed894610832aec128ca36bf327e9a29
-
Filesize
288KB
MD5df42d33b30b8803a5349608cc89feca8
SHA171be07f65a7df7f069d2d3eacf091eba929d8cf9
SHA256a9a454449e9914725e5e9884f42dac4df530b7333519d68723c628228c0f48cf
SHA512809bce8d12445ac5765db60f1516d6adaa65d5433d882647cf4d0954b1d70b337324fce23ff5319d14d5552244b66ab91ed894610832aec128ca36bf327e9a29
-
Filesize
288KB
MD5df42d33b30b8803a5349608cc89feca8
SHA171be07f65a7df7f069d2d3eacf091eba929d8cf9
SHA256a9a454449e9914725e5e9884f42dac4df530b7333519d68723c628228c0f48cf
SHA512809bce8d12445ac5765db60f1516d6adaa65d5433d882647cf4d0954b1d70b337324fce23ff5319d14d5552244b66ab91ed894610832aec128ca36bf327e9a29
-
Filesize
288KB
MD5df42d33b30b8803a5349608cc89feca8
SHA171be07f65a7df7f069d2d3eacf091eba929d8cf9
SHA256a9a454449e9914725e5e9884f42dac4df530b7333519d68723c628228c0f48cf
SHA512809bce8d12445ac5765db60f1516d6adaa65d5433d882647cf4d0954b1d70b337324fce23ff5319d14d5552244b66ab91ed894610832aec128ca36bf327e9a29