Analysis
-
max time kernel
214s -
max time network
264s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 07:29
Static task
static1
Behavioral task
behavioral1
Sample
9740b8125ee7514574c5abf44f81b0093fb835c96be4ee008664ffda7ac4c0d2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9740b8125ee7514574c5abf44f81b0093fb835c96be4ee008664ffda7ac4c0d2.exe
Resource
win10v2004-20230915-en
General
-
Target
9740b8125ee7514574c5abf44f81b0093fb835c96be4ee008664ffda7ac4c0d2.exe
-
Size
1.4MB
-
MD5
2ca1d8c2ed7a7a6f8580a6f9797c473e
-
SHA1
02d8f11b4b3076ce6fff19a75a9f6e565135b490
-
SHA256
9740b8125ee7514574c5abf44f81b0093fb835c96be4ee008664ffda7ac4c0d2
-
SHA512
d43df5e64108c77f947884615d5fefedf9b6a4a8cd66acc0449a1f24d7e3eefe3c67afcbc1e25969e5e37ff079d9b8272bfc3bddc2a9b3ca3ae64055991c3f99
-
SSDEEP
24576:U2G/nvxW3Ww0tRp8GiXTBhq7yRDvHcUcjUvy0lr3Tl6icOB/UWoT:UbA30H4zF0UMSAicOB/UWk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045988481-1457812719-2617974652-1000\Control Panel\International\Geo\Nation 9740b8125ee7514574c5abf44f81b0093fb835c96be4ee008664ffda7ac4c0d2.exe -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 208.67.222.222 Destination IP 208.67.222.222 Destination IP 208.67.222.222 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4712 powershell.exe 4712 powershell.exe -
Suspicious use of AdjustPrivilegeToken 43 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3480 WMIC.exe Token: SeSecurityPrivilege 3480 WMIC.exe Token: SeTakeOwnershipPrivilege 3480 WMIC.exe Token: SeLoadDriverPrivilege 3480 WMIC.exe Token: SeSystemProfilePrivilege 3480 WMIC.exe Token: SeSystemtimePrivilege 3480 WMIC.exe Token: SeProfSingleProcessPrivilege 3480 WMIC.exe Token: SeIncBasePriorityPrivilege 3480 WMIC.exe Token: SeCreatePagefilePrivilege 3480 WMIC.exe Token: SeBackupPrivilege 3480 WMIC.exe Token: SeRestorePrivilege 3480 WMIC.exe Token: SeShutdownPrivilege 3480 WMIC.exe Token: SeDebugPrivilege 3480 WMIC.exe Token: SeSystemEnvironmentPrivilege 3480 WMIC.exe Token: SeRemoteShutdownPrivilege 3480 WMIC.exe Token: SeUndockPrivilege 3480 WMIC.exe Token: SeManageVolumePrivilege 3480 WMIC.exe Token: 33 3480 WMIC.exe Token: 34 3480 WMIC.exe Token: 35 3480 WMIC.exe Token: 36 3480 WMIC.exe Token: SeIncreaseQuotaPrivilege 3480 WMIC.exe Token: SeSecurityPrivilege 3480 WMIC.exe Token: SeTakeOwnershipPrivilege 3480 WMIC.exe Token: SeLoadDriverPrivilege 3480 WMIC.exe Token: SeSystemProfilePrivilege 3480 WMIC.exe Token: SeSystemtimePrivilege 3480 WMIC.exe Token: SeProfSingleProcessPrivilege 3480 WMIC.exe Token: SeIncBasePriorityPrivilege 3480 WMIC.exe Token: SeCreatePagefilePrivilege 3480 WMIC.exe Token: SeBackupPrivilege 3480 WMIC.exe Token: SeRestorePrivilege 3480 WMIC.exe Token: SeShutdownPrivilege 3480 WMIC.exe Token: SeDebugPrivilege 3480 WMIC.exe Token: SeSystemEnvironmentPrivilege 3480 WMIC.exe Token: SeRemoteShutdownPrivilege 3480 WMIC.exe Token: SeUndockPrivilege 3480 WMIC.exe Token: SeManageVolumePrivilege 3480 WMIC.exe Token: 33 3480 WMIC.exe Token: 34 3480 WMIC.exe Token: 35 3480 WMIC.exe Token: 36 3480 WMIC.exe Token: SeDebugPrivilege 4712 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4432 wrote to memory of 2992 4432 9740b8125ee7514574c5abf44f81b0093fb835c96be4ee008664ffda7ac4c0d2.exe 89 PID 4432 wrote to memory of 2992 4432 9740b8125ee7514574c5abf44f81b0093fb835c96be4ee008664ffda7ac4c0d2.exe 89 PID 4432 wrote to memory of 2992 4432 9740b8125ee7514574c5abf44f81b0093fb835c96be4ee008664ffda7ac4c0d2.exe 89 PID 2992 wrote to memory of 3948 2992 cmd.exe 92 PID 2992 wrote to memory of 3948 2992 cmd.exe 92 PID 2992 wrote to memory of 3948 2992 cmd.exe 92 PID 3948 wrote to memory of 2052 3948 cmd.exe 93 PID 3948 wrote to memory of 2052 3948 cmd.exe 93 PID 3948 wrote to memory of 2052 3948 cmd.exe 93 PID 2992 wrote to memory of 1896 2992 cmd.exe 94 PID 2992 wrote to memory of 1896 2992 cmd.exe 94 PID 2992 wrote to memory of 1896 2992 cmd.exe 94 PID 1896 wrote to memory of 3480 1896 cmd.exe 95 PID 1896 wrote to memory of 3480 1896 cmd.exe 95 PID 1896 wrote to memory of 3480 1896 cmd.exe 95 PID 2992 wrote to memory of 4712 2992 cmd.exe 97 PID 2992 wrote to memory of 4712 2992 cmd.exe 97 PID 2992 wrote to memory of 4712 2992 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\9740b8125ee7514574c5abf44f81b0093fb835c96be4ee008664ffda7ac4c0d2.exe"C:\Users\Admin\AppData\Local\Temp\9740b8125ee7514574c5abf44f81b0093fb835c96be4ee008664ffda7ac4c0d2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ratt.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c nslookup myip.opendns.com. resolver1.opendns.com3⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\nslookup.exenslookup myip.opendns.com. resolver1.opendns.com4⤵PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c wmic ComputerSystem get Domain3⤵
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic ComputerSystem get Domain4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3480
-
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exePowershell -Command 'Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ratt.exe"'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD57ea1fec84d76294d9256ae3dca7676b2
SHA11e335451d1cbb6951bc77bf75430f4d983491342
SHA2569a419095c0bafc6b550f3f760c7b4f91ef3a956cfa6403d3750164ecdbe35940
SHA512ab712c45081b3d1c7edd03e67a8db1518a546f3fbf00e99838dfe03a689c4867a6953e6603dcd2be458b2441f4a2b70286fd7d096549cfcf032dd2cd54d68317