Analysis
-
max time kernel
156s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11/07/2023, 10:53
Static task
static1
Behavioral task
behavioral1
Sample
Latex-Split-Table-Column.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Latex-Split-Table-Column.exe
Resource
win10v2004-20230703-en
General
-
Target
Latex-Split-Table-Column.exe
-
Size
300.4MB
-
MD5
eff4dee32ca0f188b0f6ebe24799a489
-
SHA1
d3980fba6bf04a63567954fa7ce8b645fc20367c
-
SHA256
278ec8f7a0cd969ebb84e72f60f19bb6f6fd6f7268ebe68245c46e6de2a43cf1
-
SHA512
d6665b744541124d5172348a3b035f14e06594a6a5e0655e69053189a9e5f801774d8580ca06dbf322e1ab698c77f94fa94fa4b4ee150f80981bbac429bf9650
-
SSDEEP
49152:2OM9NlsVy2qjNdgk84444444444444444444444444444444444444444444444S:2f
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation Latex-Split-Table-Column.exe -
Executes dropped EXE 2 IoCs
pid Process 1872 dist13142.exe 2204 NFWCHK.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3440 Latex-Split-Table-Column.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3440 Latex-Split-Table-Column.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1872 dist13142.exe 1872 dist13142.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 3440 wrote to memory of 1872 3440 Latex-Split-Table-Column.exe 93 PID 3440 wrote to memory of 1872 3440 Latex-Split-Table-Column.exe 93 PID 3440 wrote to memory of 1872 3440 Latex-Split-Table-Column.exe 93 PID 1872 wrote to memory of 2204 1872 dist13142.exe 95 PID 1872 wrote to memory of 2204 1872 dist13142.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Latex-Split-Table-Column.exe"C:\Users\Admin\AppData\Local\Temp\Latex-Split-Table-Column.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\dist13142.exe"C:\Users\Admin\AppData\Local\Temp\dist13142.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Public\Documents\Wondershare\NFWCHK.exeC:\Users\Public\Documents\Wondershare\NFWCHK.exe3⤵
- Executes dropped EXE
PID:2204
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1.6MB
MD53c932a548ae7eeb26348d9b948000f84
SHA1f77cfdaec196517518f6601d1d0a6f558c8b5d53
SHA2564e555b1b5102564811a8ecb229161201e4f11f79639a50fa70e3e9aae40973ee
SHA512e4786a23902b6e738caf827962a6208d12e95f4e853d1dad50299267c80afb167055de72e4d060174220bed4ce8cc49b2d435f80631ce21c0fe68500d1372467
-
Filesize
1.6MB
MD53c932a548ae7eeb26348d9b948000f84
SHA1f77cfdaec196517518f6601d1d0a6f558c8b5d53
SHA2564e555b1b5102564811a8ecb229161201e4f11f79639a50fa70e3e9aae40973ee
SHA512e4786a23902b6e738caf827962a6208d12e95f4e853d1dad50299267c80afb167055de72e4d060174220bed4ce8cc49b2d435f80631ce21c0fe68500d1372467
-
Filesize
1.6MB
MD53c932a548ae7eeb26348d9b948000f84
SHA1f77cfdaec196517518f6601d1d0a6f558c8b5d53
SHA2564e555b1b5102564811a8ecb229161201e4f11f79639a50fa70e3e9aae40973ee
SHA512e4786a23902b6e738caf827962a6208d12e95f4e853d1dad50299267c80afb167055de72e4d060174220bed4ce8cc49b2d435f80631ce21c0fe68500d1372467
-
Filesize
1KB
MD560e743bc71f1d39757d9f3587587c1eb
SHA1e5aefc44e05a4bdc43d3250452365262241d89b0
SHA2562d6bc7a828b9676d4e986c554e3024e260ad1d644a63ca1a2559ad2cbf3985cd
SHA512071c3a7f9a68e84d1e3bd49e62c1c854edf1b56ba679345b20a755582b36615e1240c9d9d05d1bd0ac8d18f819d631907b18bdb9e3579764cf1d1d3bb3c354e7
-
Filesize
1KB
MD5e5b5bfc43bf90b846f846e435f45403d
SHA1b0eafba495fa151ae9492572a69a61be828c302d
SHA256a1813202895365d3364af50c97e5c594ed7c5482926e3ef78767be2defecfe4b
SHA51223087748d20b610632ea046f5597a12d5dd79dd458ccd09d13e89ed5ce41bcd2a98ab1ffd6a42754c44abffc69da7899c08209cfffdbaf32aee5dee2c48a4e12
-
Filesize
10KB
MD534d9559b46614a6ca272205a3b3f51bd
SHA12085856c9cedc8500ab2577b3ba21b4977294c47
SHA256f77c48a7d4bfc9f2414a434c1a9c53940f590c19827c3ef808e6a658b9d0dc8a
SHA512b185d6824efeffb019db01329061a8e12b645fda78f2d024ade120db35e6ca27754c76f649ed80fcc3255b892613645068d6c68686be4074400b7509c6247fd0
-
Filesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a
-
Filesize
7KB
MD527cfb3990872caa5930fa69d57aefe7b
SHA15e1c80d61e8db0cdc0c9b9fa3b2e36d156d45f8f
SHA25643881549228975c7506b050bce4d9b671412d3cdc08c7516c9dbbb7f50c25146
SHA512a1509024872c99c1cf63f42d9f3c5f063afde4e9490c21611551ddd2322d136ce9240256113c525305346cf7b66ccca84c3df67637c8fecbfeebf14ffa373a2a
-
Filesize
229B
MD5ad0967a0ab95aa7d71b3dc92b71b8f7a
SHA1ed63f517e32094c07a2c5b664ed1cab412233ab5
SHA2569c1212bc648a2533b53a2d0afcec518846d97630afb013742a9622f0df7b04fc
SHA51285766a907331f60044ec205cf345453fc3d44bfcac296ac93a12e8a752b84290dfd94f73b71de82f46f9503177d29602cbb87549f89dc61373d889b4ea26634b