Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
ed3f45af37817dexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
ed3f45af37817dexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
ed3f45af37817dexeexeexeex.exe
-
Size
344KB
-
MD5
ed3f45af37817d5da619b1bf293be8a4
-
SHA1
0edb9d4822cb3e4fb4368e6844baa1109b282265
-
SHA256
389ae2b2b84aea843157bafa102289d7d1e8c4772671fc5ace6776f9ed5f805b
-
SHA512
51f1a3222a3944e639d0f364e8b7eaa9c4ed7647fe2c8184175038bb8acccd141d901bccd6efe3a35ff9751322e3e1603a2473f4a920ab75946ea441e343707e
-
SSDEEP
6144:4Tz+WrPFZvTXb4RyW42vFlOloh2E+7pYUozDBRm1+gmN:4TBPFV0RyWl3h2E+7pYm0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000\Control Panel\International\Geo\Nation ed3f45af37817dexeexeexeex.exe -
Executes dropped EXE 2 IoCs
pid Process 4772 taskhostsys.exe 2036 taskhostsys.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc ed3f45af37817dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\open\command\IsolatedCommand = "\"%1\" %*" ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\runas\command ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\runas ed3f45af37817dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\runas\command\IsolatedCommand = "\"%1\" %*" ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\Local Settings ed3f45af37817dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\ = "Application" ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell ed3f45af37817dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open\command\IsolatedCommand = "\"%1\" %*" ed3f45af37817dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas\command\ = "\"%1\" %*" ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\open\command ed3f45af37817dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\ = "jitc" ed3f45af37817dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas\command\IsolatedCommand = "\"%1\" %*" ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ed3f45af37817dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\taskhostsys.exe\" /START \"%1\" %*" ed3f45af37817dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\runas\command\ = "\"%1\" %*" ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open\command ed3f45af37817dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\SysWOW_amd64\\taskhostsys.exe\" /START \"%1\" %*" ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\DefaultIcon ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\shell\open ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\DefaultIcon ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\runas\command ed3f45af37817dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\Content-Type = "application/x-msdownload" ed3f45af37817dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\jitc\DefaultIcon\ = "%1" ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe ed3f45af37817dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\Content-Type = "application/x-msdownload" ed3f45af37817dexeexeexeex.exe Set value (str) \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\DefaultIcon\ = "%1" ed3f45af37817dexeexeexeex.exe Key created \REGISTRY\USER\S-1-5-21-1043950675-1972537973-2972532878-1000_Classes\.exe\shell\open ed3f45af37817dexeexeexeex.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4772 taskhostsys.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1144 wrote to memory of 4772 1144 ed3f45af37817dexeexeexeex.exe 85 PID 1144 wrote to memory of 4772 1144 ed3f45af37817dexeexeexeex.exe 85 PID 1144 wrote to memory of 4772 1144 ed3f45af37817dexeexeexeex.exe 85 PID 4772 wrote to memory of 2036 4772 taskhostsys.exe 86 PID 4772 wrote to memory of 2036 4772 taskhostsys.exe 86 PID 4772 wrote to memory of 2036 4772 taskhostsys.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed3f45af37817dexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\ed3f45af37817dexeexeexeex.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\taskhostsys.exe" /START "C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\taskhostsys.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\taskhostsys.exe"C:\Users\Admin\AppData\Roaming\Microsoft\SysWOW_amd64\taskhostsys.exe"3⤵
- Executes dropped EXE
PID:2036
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD58b2619af7411279c82441d20fa47834e
SHA14c92be06f4fc16660bfcd7ede1e6ed4671f0f024
SHA2561fb77f69048878084d5894759566e88c5e8ff09adaddf0c26eef6e7f018f1b06
SHA512a6ecc4f37b8339cae4960e0801855fb16741f8a2744bdb585779be9e82098144af8065d708d646ec2e5556891f6864def9ed789564d24203330fa719cf872de0
-
Filesize
344KB
MD58b2619af7411279c82441d20fa47834e
SHA14c92be06f4fc16660bfcd7ede1e6ed4671f0f024
SHA2561fb77f69048878084d5894759566e88c5e8ff09adaddf0c26eef6e7f018f1b06
SHA512a6ecc4f37b8339cae4960e0801855fb16741f8a2744bdb585779be9e82098144af8065d708d646ec2e5556891f6864def9ed789564d24203330fa719cf872de0
-
Filesize
344KB
MD58b2619af7411279c82441d20fa47834e
SHA14c92be06f4fc16660bfcd7ede1e6ed4671f0f024
SHA2561fb77f69048878084d5894759566e88c5e8ff09adaddf0c26eef6e7f018f1b06
SHA512a6ecc4f37b8339cae4960e0801855fb16741f8a2744bdb585779be9e82098144af8065d708d646ec2e5556891f6864def9ed789564d24203330fa719cf872de0
-
Filesize
344KB
MD58b2619af7411279c82441d20fa47834e
SHA14c92be06f4fc16660bfcd7ede1e6ed4671f0f024
SHA2561fb77f69048878084d5894759566e88c5e8ff09adaddf0c26eef6e7f018f1b06
SHA512a6ecc4f37b8339cae4960e0801855fb16741f8a2744bdb585779be9e82098144af8065d708d646ec2e5556891f6864def9ed789564d24203330fa719cf872de0