Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10-10-2023 12:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
1.4MB
-
MD5
8d91ce7f3a66bcfda11e488cc34c698f
-
SHA1
c4f17865340d02e6626e822d6617fc219f8b5fea
-
SHA256
f380115cce9725db41bba7feb4556265d22b6a284105e0412f86f71fe3bb8f90
-
SHA512
aaab62ae1bfc8d8bd90ec5bd73a681086b028c7a2773d1a8d62493e179aaad7ef84786dd21f9a265f3ce023e444aa761b3913066f185d5af78e9490b9fb89f4c
-
SSDEEP
24576:tyCLlijKmzV9INo64I3ZxDt/7K2S4o7hF0JRHnlb3MHNNz8vig3T:tyCMPwRFoHNNz8vig3T
Score
8/10
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-607259312-1573743425-2763420908-1000\Control Panel\International\Geo\Nation tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1008 set thread context of 2616 1008 tmp.exe 29 -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe 2616 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1008 tmp.exe Token: SeDebugPrivilege 2616 tmp.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1008 wrote to memory of 2616 1008 tmp.exe 29 PID 1008 wrote to memory of 2616 1008 tmp.exe 29 PID 1008 wrote to memory of 2616 1008 tmp.exe 29 PID 1008 wrote to memory of 2616 1008 tmp.exe 29 PID 1008 wrote to memory of 2616 1008 tmp.exe 29 PID 1008 wrote to memory of 2616 1008 tmp.exe 29 PID 1008 wrote to memory of 2616 1008 tmp.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2616
-