Analysis
-
max time kernel
178s -
max time network
184s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
29/09/2023, 22:23
Static task
static1
Behavioral task
behavioral1
Sample
c0c659c9356c6331f6e3bbd17d3f1fde950042706f46157f97e6c1b5aab7d9c2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
c0c659c9356c6331f6e3bbd17d3f1fde950042706f46157f97e6c1b5aab7d9c2.exe
Resource
win10v2004-20230915-en
General
-
Target
c0c659c9356c6331f6e3bbd17d3f1fde950042706f46157f97e6c1b5aab7d9c2.exe
-
Size
2.5MB
-
MD5
b92f00c19481696afcb003d1aa927205
-
SHA1
16ab0431a8b87f50dd1e08b02375b77274b2764e
-
SHA256
c0c659c9356c6331f6e3bbd17d3f1fde950042706f46157f97e6c1b5aab7d9c2
-
SHA512
02f2a2b611fcac05979b37a1634f6325fc24fb9e976484d5a170fe0c6a86f7db3b2b3f9aa177dbdfa8a1eaff0c05c6ae2b2e5f710fcb25cf07185b506fe9a0de
-
SSDEEP
24576:KXqtba4lOOWuk04i7jjU6k7QeLqBQdTbCOYwxZM:KXRDirU6k7KBQdTpZM
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation c0c659c9356c6331f6e3bbd17d3f1fde950042706f46157f97e6c1b5aab7d9c2.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Script User-Agent 1 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 33 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4980 c0c659c9356c6331f6e3bbd17d3f1fde950042706f46157f97e6c1b5aab7d9c2.exe 4980 c0c659c9356c6331f6e3bbd17d3f1fde950042706f46157f97e6c1b5aab7d9c2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4980 c0c659c9356c6331f6e3bbd17d3f1fde950042706f46157f97e6c1b5aab7d9c2.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4980 c0c659c9356c6331f6e3bbd17d3f1fde950042706f46157f97e6c1b5aab7d9c2.exe 4980 c0c659c9356c6331f6e3bbd17d3f1fde950042706f46157f97e6c1b5aab7d9c2.exe 4980 c0c659c9356c6331f6e3bbd17d3f1fde950042706f46157f97e6c1b5aab7d9c2.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c0c659c9356c6331f6e3bbd17d3f1fde950042706f46157f97e6c1b5aab7d9c2.exe"C:\Users\Admin\AppData\Local\Temp\c0c659c9356c6331f6e3bbd17d3f1fde950042706f46157f97e6c1b5aab7d9c2.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4980 -
C:\Users\Admin\Downloads\Farmfy Setup 3.0.4.exe"C:\Users\Admin\Downloads\Farmfy Setup 3.0.4.exe"2⤵PID:3260
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65.7MB
MD5fc64fe2af50d626f1bd9648b4d39346a
SHA1af20bd714c42a24dc1342fe9953343a7f2dc7aa8
SHA256cd39c58f8219cef00314527d74a00b77eae99b444be2103a0d139bede613b025
SHA5126a99b97bbe2cb1b7fa98592a16cd6be5a81227e990d2f0f802d6a6c700e4676918b57132f1ddd4f8b7638f05c4df0221a306168ef5883eeb91fe9ca2457b333c