Resubmissions
12/10/2023, 09:17
231012-k9jccaae7t 711/10/2023, 09:08
231011-k4bejsfa98 311/10/2023, 09:00
231011-kydbyseg56 711/10/2023, 08:53
231011-ktflhsee35 705/10/2023, 08:00
231005-jvzv4she8t 705/10/2023, 07:52
231005-jqs7rsbd65 305/10/2023, 06:28
231005-g8clmaba26 3Analysis
-
max time kernel
1799s -
max time network
1158s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 09:17
Static task
static1
Behavioral task
behavioral1
Sample
500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe
Resource
win10v2004-20230915-en
General
-
Target
500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe
-
Size
727KB
-
MD5
3bd2bc1fb2ed7ce223505556ee150890
-
SHA1
4cfd2d4f3c8c7359164eb79cf0830480d4793f1d
-
SHA256
500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37
-
SHA512
374eae32c1e803f468ed248d7828ea98b438d1377e21775beb5e0a477b593816ffa543d7dd3da94613d7e448a9d5557269f2c1b27d30726c85cf0a73f89883de
-
SSDEEP
12288:TcTn6DzlAr6n1X+R1vXAMk8Bm+r7uobOJ6+ShsoaqEkgOsS5:ATn0e6gA0w+3uVzShRag2S5
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4392 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 3340 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 3376 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4392 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 4392 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 3340 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 3340 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 3376 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 3376 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4392 wrote to memory of 3340 4392 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 94 PID 4392 wrote to memory of 3340 4392 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 94 PID 4392 wrote to memory of 3340 4392 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 94 PID 3384 wrote to memory of 988 3384 cmd.exe 96 PID 3384 wrote to memory of 988 3384 cmd.exe 96 PID 3340 wrote to memory of 3376 3340 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 101 PID 3340 wrote to memory of 3376 3340 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 101 PID 3340 wrote to memory of 3376 3340 500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe 101 PID 3384 wrote to memory of 2028 3384 cmd.exe 122 PID 3384 wrote to memory of 2028 3384 cmd.exe 122 PID 3384 wrote to memory of 4732 3384 cmd.exe 125 PID 3384 wrote to memory of 4732 3384 cmd.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe"C:\Users\Admin\AppData\Local\Temp\500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe"1⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Users\Admin\AppData\Local\Temp\500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe"C:\Users\Admin\AppData\Local\Temp\500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe" /retrynav 12⤵
- Checks computer location settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe"C:\Users\Admin\AppData\Local\Temp\500d0c1f457ab162b7ea0f1d31c32757d70421b8c9bc7b0083a5e3567441ed37.exe" /retrynav 23⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3376
-
-
-
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\system32\netsh.exenetsh.exe winhttp show proxy2⤵PID:988
-
-
C:\Windows\system32\netsh.exenetsh winhttp show proxy2⤵PID:2028
-
-
C:\Windows\system32\netsh.exenetsh winhttp show proxy2⤵PID:4732
-