Analysis
-
max time kernel
153s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2023, 00:31
Behavioral task
behavioral1
Sample
49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe
Resource
win7-20230831-en
General
-
Target
49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe
-
Size
14.0MB
-
MD5
a450ee89273cbdcebdf17236921f23c3
-
SHA1
a2847a809722e92e55a01fd4c92199a0b2967f4c
-
SHA256
49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74
-
SHA512
efec75f2376b902b066bff89d16c330978368de2b0e766506a99b9f60ab83f0968a039e5e4a8a9f652a067431f0382355dbaa0631a4f637422cbdca3fb53a4d4
-
SSDEEP
393216:ACqIuAHiDG4Nd6N7H1ZXnfAGsXUnGfBvgufmKrCG6:ACqlAHifd6XmXUGZvgu+G6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe -
resource yara_rule behavioral2/memory/876-11-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-13-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-21-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-23-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-25-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-27-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-29-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-33-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-36-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-38-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-40-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-42-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-51-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-53-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-55-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-57-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-59-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-61-0x0000000003F20000-0x0000000003F46000-memory.dmp upx behavioral2/memory/876-63-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-62-0x0000000003F50000-0x0000000003F76000-memory.dmp upx behavioral2/memory/876-64-0x0000000003F50000-0x0000000003F76000-memory.dmp upx behavioral2/memory/876-65-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/876-68-0x0000000003F20000-0x0000000003F46000-memory.dmp upx behavioral2/memory/876-69-0x0000000003F50000-0x0000000003F76000-memory.dmp upx behavioral2/memory/876-72-0x0000000003F20000-0x0000000003F46000-memory.dmp upx behavioral2/memory/876-73-0x0000000003F50000-0x0000000003F76000-memory.dmp upx -
resource yara_rule behavioral2/memory/876-0-0x0000000000400000-0x0000000001DD7000-memory.dmp vmprotect behavioral2/memory/876-31-0x0000000000400000-0x0000000001DD7000-memory.dmp vmprotect behavioral2/memory/876-71-0x0000000000400000-0x0000000001DD7000-memory.dmp vmprotect -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4100 PING.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 876 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 876 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 876 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 876 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 876 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 876 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 876 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 876 wrote to memory of 1396 876 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 99 PID 876 wrote to memory of 1396 876 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 99 PID 876 wrote to memory of 1396 876 49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe 99 PID 1396 wrote to memory of 4100 1396 cmd.exe 101 PID 1396 wrote to memory of 4100 1396 cmd.exe 101 PID 1396 wrote to memory of 4100 1396 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe"C:\Users\Admin\AppData\Local\Temp\49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe"1⤵
- Checks computer location settings
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\SysWOW64\cmd.execmd /c ping 127.0.0.1 -n 5 &del "C:\Users\Admin\AppData\Local\Temp\49b667ada4a35aad3c854d8b8448b6eb9a482cde6af7066e19291d36d73b0d74.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 53⤵
- Runs ping.exe
PID:4100
-
-