Analysis
-
max time kernel
7s -
max time network
8s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
09-10-2023 11:31
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
203KB
-
MD5
4f707c67968a14d08cc42958d5341707
-
SHA1
accf64200195ef1ca9c7f497508c4bfb4e18da41
-
SHA256
8da85cb00f7ba5e8c23b058d31a4b169c18936a8f7181015ce27e871d8b8cccd
-
SHA512
9790ab884d3d43f23005a2085b3b320f9bf2ce8ccffd4476ea0b8f2a49cce11c6a61f3ed061d4fa759c167fd6728d890363a148c731251abfdab2bace96432ed
-
SSDEEP
3072:6qUhUhEnI2XCIaxTrjCgmQ8GiVDswVAETR:bUWEIKXwr2OmA
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
tmp.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
tmp.exepid Process 4828 tmp.exe 4828 tmp.exe 4828 tmp.exe 4828 tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
tmp.exedescription pid Process Token: SeDebugPrivilege 4828 tmp.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
tmp.exenet.exenet.exedescription pid Process procid_target PID 4828 wrote to memory of 2388 4828 tmp.exe 23 PID 4828 wrote to memory of 4320 4828 tmp.exe 93 PID 4828 wrote to memory of 4320 4828 tmp.exe 93 PID 4828 wrote to memory of 3992 4828 tmp.exe 95 PID 4828 wrote to memory of 3992 4828 tmp.exe 95 PID 4320 wrote to memory of 3692 4320 net.exe 97 PID 4320 wrote to memory of 3692 4320 net.exe 97 PID 3992 wrote to memory of 3748 3992 net.exe 98 PID 3992 wrote to memory of 3748 3992 net.exe 98 PID 4828 wrote to memory of 2404 4828 tmp.exe 31 PID 4828 wrote to memory of 2540 4828 tmp.exe 29 PID 4828 wrote to memory of 3252 4828 tmp.exe 78 PID 4828 wrote to memory of 3484 4828 tmp.exe 77
Processes
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2388
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2540
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2404
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3484
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "audioendpointbuilder" /y2⤵
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "audioendpointbuilder" /y3⤵PID:3692
-
-
-
C:\Windows\System32\net.exe"C:\Windows\System32\net.exe" stop "samss" /y2⤵
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\system32\net1.exeC:\Windows\system32\net1 stop "samss" /y3⤵PID:3748
-
-