Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 19:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
6 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
1.4MB
-
MD5
8d91ce7f3a66bcfda11e488cc34c698f
-
SHA1
c4f17865340d02e6626e822d6617fc219f8b5fea
-
SHA256
f380115cce9725db41bba7feb4556265d22b6a284105e0412f86f71fe3bb8f90
-
SHA512
aaab62ae1bfc8d8bd90ec5bd73a681086b028c7a2773d1a8d62493e179aaad7ef84786dd21f9a265f3ce023e444aa761b3913066f185d5af78e9490b9fb89f4c
-
SSDEEP
24576:tyCLlijKmzV9INo64I3ZxDt/7K2S4o7hF0JRHnlb3MHNNz8vig3T:tyCMPwRFoHNNz8vig3T
Score
8/10
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-686452656-3203474025-4140627569-1000\Control Panel\International\Geo\Nation tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2184 set thread context of 2668 2184 tmp.exe 28 -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe 2668 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2184 tmp.exe Token: SeDebugPrivilege 2668 tmp.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2668 2184 tmp.exe 28 PID 2184 wrote to memory of 2668 2184 tmp.exe 28 PID 2184 wrote to memory of 2668 2184 tmp.exe 28 PID 2184 wrote to memory of 2668 2184 tmp.exe 28 PID 2184 wrote to memory of 2668 2184 tmp.exe 28 PID 2184 wrote to memory of 2668 2184 tmp.exe 28 PID 2184 wrote to memory of 2668 2184 tmp.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-