Analysis
-
max time kernel
143s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 09:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
23766473663532263.exe
Resource
win7-20230831-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
23766473663532263.exe
Resource
win10v2004-20230915-en
5 signatures
150 seconds
General
-
Target
23766473663532263.exe
-
Size
674KB
-
MD5
885896c57d4b67ea021b5fed43f7f53c
-
SHA1
4cb92a952f30d93dd2dfc95275121145a87a013f
-
SHA256
e12bb875c395c4575c2482f653fd3005cc564a244e027f47218c99569c22ccf2
-
SHA512
3c258ed966420bdb78619984d36ccdf04712b977c77d2e1b7ef4ca24cb668861d2114437ad7449063b57bc0050c0618bab34da8818ce5f05d72f20423a2ec10b
-
SSDEEP
12288:swYX9K1MgxDLPFMe6svQgLp7K13pKHTe0cc7sSnmZtVpZNOP:wtKDLPFZvQgdYQc7SnmZHnQ
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3185155662-718608226-894467740-1000\Control Panel\International\Geo\Nation 23766473663532263.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1252 set thread context of 2772 1252 23766473663532263.exe 30 PID 2772 set thread context of 1252 2772 23766473663532263.exe 12 -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1252 23766473663532263.exe 1252 23766473663532263.exe 1252 23766473663532263.exe 1252 23766473663532263.exe 2772 23766473663532263.exe 2772 23766473663532263.exe 2772 23766473663532263.exe 2772 23766473663532263.exe 1252 23766473663532263.exe 1252 23766473663532263.exe 2772 23766473663532263.exe 2772 23766473663532263.exe 2772 23766473663532263.exe 2772 23766473663532263.exe 2772 23766473663532263.exe 2772 23766473663532263.exe 2772 23766473663532263.exe 2772 23766473663532263.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2772 23766473663532263.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1252 23766473663532263.exe Token: SeDebugPrivilege 2772 23766473663532263.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1252 wrote to memory of 2772 1252 23766473663532263.exe 30 PID 1252 wrote to memory of 2772 1252 23766473663532263.exe 30 PID 1252 wrote to memory of 2772 1252 23766473663532263.exe 30 PID 1252 wrote to memory of 2772 1252 23766473663532263.exe 30 PID 1252 wrote to memory of 2772 1252 23766473663532263.exe 30 PID 1252 wrote to memory of 2772 1252 23766473663532263.exe 30 PID 1252 wrote to memory of 2772 1252 23766473663532263.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\23766473663532263.exe"C:\Users\Admin\AppData\Local\Temp\23766473663532263.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\23766473663532263.exe"C:\Users\Admin\AppData\Local\Temp\23766473663532263.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2772
-