Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
11-10-2023 23:10
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
windows7-x64
12 signatures
150 seconds
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
tmp.exe
-
Size
737KB
-
MD5
d54ddeb1ceaa4b97d777db0335765e31
-
SHA1
e7d5613db327190562de2c627afceef830195f6c
-
SHA256
3ba7c1a01fe40fab7b53ae3a50aaba4f1d1300a857f4b91352f2423a3f7a4cb2
-
SHA512
6d07511e8e97896b98b7dfe16adfd19027aff7d7c9b0ec221a5165be28e52d7cd659692ab0ad52db02addc0f0213e60d3fcc9eb9d0bcde1353a52b63e01115aa
-
SSDEEP
12288:f06gzHa2iNP1U8kM7j418EZYw4lB/brrGL98Muv6DXfuADUkySTLs7Tn:8TG1FDOTZYlhrGL98MJDUkRTL4z
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation tmp.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2340 set thread context of 4428 2340 tmp.exe 107 PID 4428 set thread context of 2572 4428 tmp.exe 42 PID 4428 set thread context of 2840 4428 tmp.exe 109 -
description ioc Process Key created \Registry\User\S-1-5-21-3027552071-446050021-1254071215-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 systray.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2340 tmp.exe 2340 tmp.exe 4428 tmp.exe 4428 tmp.exe 4428 tmp.exe 4428 tmp.exe 4428 tmp.exe 4428 tmp.exe 4428 tmp.exe 4428 tmp.exe 4428 tmp.exe 4428 tmp.exe 4428 tmp.exe 4428 tmp.exe 4428 tmp.exe 4428 tmp.exe 4428 tmp.exe 4428 tmp.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 4428 tmp.exe 2572 Explorer.EXE 2572 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2340 tmp.exe Token: SeDebugPrivilege 4428 tmp.exe Token: SeShutdownPrivilege 2572 Explorer.EXE Token: SeCreatePagefilePrivilege 2572 Explorer.EXE Token: SeShutdownPrivilege 2572 Explorer.EXE Token: SeCreatePagefilePrivilege 2572 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2340 wrote to memory of 2032 2340 tmp.exe 106 PID 2340 wrote to memory of 2032 2340 tmp.exe 106 PID 2340 wrote to memory of 2032 2340 tmp.exe 106 PID 2340 wrote to memory of 4428 2340 tmp.exe 107 PID 2340 wrote to memory of 4428 2340 tmp.exe 107 PID 2340 wrote to memory of 4428 2340 tmp.exe 107 PID 2340 wrote to memory of 4428 2340 tmp.exe 107 PID 2340 wrote to memory of 4428 2340 tmp.exe 107 PID 2340 wrote to memory of 4428 2340 tmp.exe 107 PID 2572 wrote to memory of 2840 2572 Explorer.EXE 109 PID 2572 wrote to memory of 2840 2572 Explorer.EXE 109 PID 2572 wrote to memory of 2840 2572 Explorer.EXE 109
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4428
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Modifies Internet Explorer settings
PID:2840 -
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵PID:3444
-
-