Analysis
-
max time kernel
146s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
05/10/2023, 20:05
Static task
static1
Behavioral task
behavioral1
Sample
cc52ee754ae49718a49352cab0d0f4c44876e46241f7801aa3a911670361e2f1.exe
Resource
win10v2004-20230915-en
General
-
Target
cc52ee754ae49718a49352cab0d0f4c44876e46241f7801aa3a911670361e2f1.exe
-
Size
252KB
-
MD5
4bc7e211b2498a8e2aa1c121986ce91f
-
SHA1
54ce45ec57abe0a916241f5ed2f787bcdf3bccb0
-
SHA256
cc52ee754ae49718a49352cab0d0f4c44876e46241f7801aa3a911670361e2f1
-
SHA512
c2542685030aa5fa0c27dfe1322d3c3db6687704409b3227279faa77ecc8785ed88adb5527c4562b7b02a20134a497f370d8dcf7a18b86186f4d6a9bff103add
-
SSDEEP
3072:fR6fw3if25pKcZKa59hLlMG6jRjS4SfeZZz/8t67xpR34s9zDIh6J4I5bQxIbH6J:iwz5Mcc6AjRjKfkZz/BMsNtJxcxIK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation cc52ee754ae49718a49352cab0d0f4c44876e46241f7801aa3a911670361e2f1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3408 2652 WerFault.exe 76 -
Kills process with taskkill 1 IoCs
pid Process 1160 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1160 taskkill.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2652 wrote to memory of 4004 2652 cc52ee754ae49718a49352cab0d0f4c44876e46241f7801aa3a911670361e2f1.exe 96 PID 2652 wrote to memory of 4004 2652 cc52ee754ae49718a49352cab0d0f4c44876e46241f7801aa3a911670361e2f1.exe 96 PID 2652 wrote to memory of 4004 2652 cc52ee754ae49718a49352cab0d0f4c44876e46241f7801aa3a911670361e2f1.exe 96 PID 4004 wrote to memory of 1160 4004 cmd.exe 99 PID 4004 wrote to memory of 1160 4004 cmd.exe 99 PID 4004 wrote to memory of 1160 4004 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc52ee754ae49718a49352cab0d0f4c44876e46241f7801aa3a911670361e2f1.exe"C:\Users\Admin\AppData\Local\Temp\cc52ee754ae49718a49352cab0d0f4c44876e46241f7801aa3a911670361e2f1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im "cc52ee754ae49718a49352cab0d0f4c44876e46241f7801aa3a911670361e2f1.exe" /f & erase "C:\Users\Admin\AppData\Local\Temp\cc52ee754ae49718a49352cab0d0f4c44876e46241f7801aa3a911670361e2f1.exe" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im "cc52ee754ae49718a49352cab0d0f4c44876e46241f7801aa3a911670361e2f1.exe" /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1160
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 14322⤵
- Program crash
PID:3408
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 2652 -ip 26521⤵PID:556