Analysis
-
max time kernel
146s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
18/09/2023, 09:37
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
0 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
109KB
-
MD5
87c75be0b9d3b976b783825a6da125d3
-
SHA1
55d8066291ca17512f48eb27c066168540004bc4
-
SHA256
57d8e4fe051598089811d8f04b482f010599cfe3eeb07f164f8888b1ae72d634
-
SHA512
396d589213fcf43ef4ee8b63d8087a93eea76e9abb2b06b6660388bf10563104d8d1d890f0d7f76bb910961f53bc1faf079ededd79368411c37463b683a9f909
-
SSDEEP
1536:RYaDDbFzTTtybc+yN08znUd9EBZobiDJ5y8rPJ1qerzpatHz9egKf:RYWF0bsa8UOB2biOIP3WE
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1926387074-3400613176-3566796709-1000\Control Panel\International\Geo\Nation tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4160 tmp.exe 4160 tmp.exe 4160 tmp.exe 4160 tmp.exe 4160 tmp.exe 4160 tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4160 tmp.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4160 wrote to memory of 2784 4160 tmp.exe 85 PID 4160 wrote to memory of 2784 4160 tmp.exe 85 PID 4160 wrote to memory of 2784 4160 tmp.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /delete /f /tn DNDWMYRI2⤵PID:2784
-