Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2023 14:43
Static task
static1
Behavioral task
behavioral1
Sample
14eed63dd3f3814eb8640b7437dcea62.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
14eed63dd3f3814eb8640b7437dcea62.exe
Resource
win10v2004-20230703-en
General
-
Target
14eed63dd3f3814eb8640b7437dcea62.exe
-
Size
104KB
-
MD5
14eed63dd3f3814eb8640b7437dcea62
-
SHA1
a6e9ba8f069961a7b0f5dbdf35dea5c354eb6aa5
-
SHA256
3ac16c7b82034ad11f034dd1edab2484577eac6e2991e65a2fd1299784687df2
-
SHA512
6792834ced2429f62088487516a23f682f0851826b4fb4dec6044e8deeaeca08323e6ca35d04e618d50458f6bfbd5f27685e4b0cd7c6b608d19b0f42e919217f
-
SSDEEP
3072:Yp/uy6Ogx6bsBnKZ2kNVmJQuahzata9DP:Yp/MOgx6sBnSlmJQhhOt
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\Control Panel\International\Geo\Nation 14eed63dd3f3814eb8640b7437dcea62.exe -
Drops startup file 4 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk 14eed63dd3f3814eb8640b7437dcea62.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk Payload.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe Payload.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.exe Payload.exe -
Executes dropped EXE 1 IoCs
pid Process 428 Payload.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe Set value (str) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Payload.exe" 14eed63dd3f3814eb8640b7437dcea62.exe Set value (str) \REGISTRY\USER\S-1-5-21-3011986978-2180659500-3669311805-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" Payload.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 29 IoCs
description pid Process Token: SeDebugPrivilege 428 Payload.exe Token: 33 428 Payload.exe Token: SeIncBasePriorityPrivilege 428 Payload.exe Token: 33 428 Payload.exe Token: SeIncBasePriorityPrivilege 428 Payload.exe Token: 33 428 Payload.exe Token: SeIncBasePriorityPrivilege 428 Payload.exe Token: 33 428 Payload.exe Token: SeIncBasePriorityPrivilege 428 Payload.exe Token: 33 428 Payload.exe Token: SeIncBasePriorityPrivilege 428 Payload.exe Token: 33 428 Payload.exe Token: SeIncBasePriorityPrivilege 428 Payload.exe Token: 33 428 Payload.exe Token: SeIncBasePriorityPrivilege 428 Payload.exe Token: 33 428 Payload.exe Token: SeIncBasePriorityPrivilege 428 Payload.exe Token: 33 428 Payload.exe Token: SeIncBasePriorityPrivilege 428 Payload.exe Token: 33 428 Payload.exe Token: SeIncBasePriorityPrivilege 428 Payload.exe Token: 33 428 Payload.exe Token: SeIncBasePriorityPrivilege 428 Payload.exe Token: 33 428 Payload.exe Token: SeIncBasePriorityPrivilege 428 Payload.exe Token: 33 428 Payload.exe Token: SeIncBasePriorityPrivilege 428 Payload.exe Token: 33 428 Payload.exe Token: SeIncBasePriorityPrivilege 428 Payload.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2920 wrote to memory of 428 2920 14eed63dd3f3814eb8640b7437dcea62.exe 96 PID 2920 wrote to memory of 428 2920 14eed63dd3f3814eb8640b7437dcea62.exe 96 PID 2920 wrote to memory of 428 2920 14eed63dd3f3814eb8640b7437dcea62.exe 96 PID 2920 wrote to memory of 4184 2920 14eed63dd3f3814eb8640b7437dcea62.exe 97 PID 2920 wrote to memory of 4184 2920 14eed63dd3f3814eb8640b7437dcea62.exe 97 PID 2920 wrote to memory of 4184 2920 14eed63dd3f3814eb8640b7437dcea62.exe 97 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4184 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\14eed63dd3f3814eb8640b7437dcea62.exe"C:\Users\Admin\AppData\Local\Temp\14eed63dd3f3814eb8640b7437dcea62.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Payload.exe"C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Local\Temp\Payload.exe"2⤵
- Views/modifies file attributes
PID:4184
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD514eed63dd3f3814eb8640b7437dcea62
SHA1a6e9ba8f069961a7b0f5dbdf35dea5c354eb6aa5
SHA2563ac16c7b82034ad11f034dd1edab2484577eac6e2991e65a2fd1299784687df2
SHA5126792834ced2429f62088487516a23f682f0851826b4fb4dec6044e8deeaeca08323e6ca35d04e618d50458f6bfbd5f27685e4b0cd7c6b608d19b0f42e919217f
-
Filesize
104KB
MD514eed63dd3f3814eb8640b7437dcea62
SHA1a6e9ba8f069961a7b0f5dbdf35dea5c354eb6aa5
SHA2563ac16c7b82034ad11f034dd1edab2484577eac6e2991e65a2fd1299784687df2
SHA5126792834ced2429f62088487516a23f682f0851826b4fb4dec6044e8deeaeca08323e6ca35d04e618d50458f6bfbd5f27685e4b0cd7c6b608d19b0f42e919217f
-
Filesize
104KB
MD514eed63dd3f3814eb8640b7437dcea62
SHA1a6e9ba8f069961a7b0f5dbdf35dea5c354eb6aa5
SHA2563ac16c7b82034ad11f034dd1edab2484577eac6e2991e65a2fd1299784687df2
SHA5126792834ced2429f62088487516a23f682f0851826b4fb4dec6044e8deeaeca08323e6ca35d04e618d50458f6bfbd5f27685e4b0cd7c6b608d19b0f42e919217f
-
Filesize
1KB
MD5ba26fc27031a43b150d87c22d831460c
SHA17e78250b2ebb2e0ff7117dad03c26c511a3b8d44
SHA256d20f342693260bcb51aeabf7cd5c4994e0ebf88847ca83b36a2ef191447fa5d8
SHA512038d7e25dcfa917dfc580b1a07995e4ad3a6eed75ff6cd5d7d8bae97760e69aad39bf0522f6f5b30b022c9c86d8df1ef7257939e092edd02adf6f077c3142fd4
-
Filesize
1KB
MD50ebe6330bc59fdcfa221283ee4139717
SHA1e391997341a119bccce5092160ece3cca6b03aea
SHA256a31bddc9d3df1506d154ddd6e1608a5b7cb9f8eb64c84c0140bc19a75d273d04
SHA5125908d2ee1d6e204245334abf0c9aedbbccc25feccf5a38c8355e960d36fd24c8815fa18abc2cd5eccf0e3cbc664253b23993780a967a9d72c433775bad98ab38