Analysis
-
max time kernel
143s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 12:59
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
1.4MB
-
MD5
8d91ce7f3a66bcfda11e488cc34c698f
-
SHA1
c4f17865340d02e6626e822d6617fc219f8b5fea
-
SHA256
f380115cce9725db41bba7feb4556265d22b6a284105e0412f86f71fe3bb8f90
-
SHA512
aaab62ae1bfc8d8bd90ec5bd73a681086b028c7a2773d1a8d62493e179aaad7ef84786dd21f9a265f3ce023e444aa761b3913066f185d5af78e9490b9fb89f4c
-
SSDEEP
24576:tyCLlijKmzV9INo64I3ZxDt/7K2S4o7hF0JRHnlb3MHNNz8vig3T:tyCMPwRFoHNNz8vig3T
Score
8/10
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1574508946-349927670-1185736483-1000\Control Panel\International\Geo\Nation tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 316 set thread context of 4516 316 tmp.exe 89 -
Suspicious behavior: EnumeratesProcesses 60 IoCs
pid Process 316 tmp.exe 316 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe 4516 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 316 tmp.exe Token: SeDebugPrivilege 4516 tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 316 wrote to memory of 3348 316 tmp.exe 88 PID 316 wrote to memory of 3348 316 tmp.exe 88 PID 316 wrote to memory of 3348 316 tmp.exe 88 PID 316 wrote to memory of 4516 316 tmp.exe 89 PID 316 wrote to memory of 4516 316 tmp.exe 89 PID 316 wrote to memory of 4516 316 tmp.exe 89 PID 316 wrote to memory of 4516 316 tmp.exe 89 PID 316 wrote to memory of 4516 316 tmp.exe 89 PID 316 wrote to memory of 4516 316 tmp.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵PID:3348
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4516
-