Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
10-10-2023 19:20
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
1.4MB
-
MD5
8d91ce7f3a66bcfda11e488cc34c698f
-
SHA1
c4f17865340d02e6626e822d6617fc219f8b5fea
-
SHA256
f380115cce9725db41bba7feb4556265d22b6a284105e0412f86f71fe3bb8f90
-
SHA512
aaab62ae1bfc8d8bd90ec5bd73a681086b028c7a2773d1a8d62493e179aaad7ef84786dd21f9a265f3ce023e444aa761b3913066f185d5af78e9490b9fb89f4c
-
SSDEEP
24576:tyCLlijKmzV9INo64I3ZxDt/7K2S4o7hF0JRHnlb3MHNNz8vig3T:tyCMPwRFoHNNz8vig3T
Score
8/10
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation tmp.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 320 set thread context of 964 320 tmp.exe 87 -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe 964 tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 320 tmp.exe Token: SeDebugPrivilege 964 tmp.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 320 wrote to memory of 964 320 tmp.exe 87 PID 320 wrote to memory of 964 320 tmp.exe 87 PID 320 wrote to memory of 964 320 tmp.exe 87 PID 320 wrote to memory of 964 320 tmp.exe 87 PID 320 wrote to memory of 964 320 tmp.exe 87 PID 320 wrote to memory of 964 320 tmp.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\tmp.exeC:\Users\Admin\AppData\Local\Temp\tmp.exe2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:964
-