Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15/10/2023, 19:43
Static task
static1
Behavioral task
behavioral1
Sample
b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe
-
Size
279KB
-
MD5
b96622e7dcccbab7a7dc556bdc3b2d70
-
SHA1
567da557cfcb7610dcab81e76492c3d6516a6bc0
-
SHA256
937c535b83978e7fd87039b61c735de1b06f44921bc70513d9cfc8b903c29340
-
SHA512
f85d370956b3dc8958417093637a83b54f30c74a98f8c652f24720b6444f2a2bc589f25f29bb399d52993bf7233f498a6084edb4206e33cf27bd8a937e8b517b
-
SSDEEP
3072:R8ERv3zZZm5c4Sq+YN95wFT0z+QadjN3rOwRXENk+Y0yFNzlUu0VS:R8EZrm55Zt5wFwz+TdpRXENFTAkVS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe -
Executes dropped EXE 1 IoCs
pid Process 2528 Systeamgrgng.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe 2528 Systeamgrgng.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3352 wrote to memory of 2528 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 87 PID 3352 wrote to memory of 2528 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 87 PID 3352 wrote to memory of 2528 3352 b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe"C:\Users\Admin\AppData\Local\Temp\b96622e7dcccbab7a7dc556bdc3b2d70_exe32.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\Systeamgrgng.exe"C:\Users\Admin\AppData\Local\Temp\Systeamgrgng.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
279KB
MD5ec151f949cba2fa0ae4a1781eae1fa3d
SHA1f12a3bb79e1e7dafa7ba42dfcdd88f448ce257e1
SHA25628187ef2ce526f1f1cd37694e085a0944ff748626e1c357d4db6cb5f111d27d5
SHA5120ae1c77f8c71fd8452e76cff9d6257af03ce270772af4c076fd144f2dd6277277bfa77a64ac020716ab76648217f4258b016daa1de268d3a5d0271be4ea788ca
-
Filesize
279KB
MD5ec151f949cba2fa0ae4a1781eae1fa3d
SHA1f12a3bb79e1e7dafa7ba42dfcdd88f448ce257e1
SHA25628187ef2ce526f1f1cd37694e085a0944ff748626e1c357d4db6cb5f111d27d5
SHA5120ae1c77f8c71fd8452e76cff9d6257af03ce270772af4c076fd144f2dd6277277bfa77a64ac020716ab76648217f4258b016daa1de268d3a5d0271be4ea788ca
-
Filesize
279KB
MD5ec151f949cba2fa0ae4a1781eae1fa3d
SHA1f12a3bb79e1e7dafa7ba42dfcdd88f448ce257e1
SHA25628187ef2ce526f1f1cd37694e085a0944ff748626e1c357d4db6cb5f111d27d5
SHA5120ae1c77f8c71fd8452e76cff9d6257af03ce270772af4c076fd144f2dd6277277bfa77a64ac020716ab76648217f4258b016daa1de268d3a5d0271be4ea788ca
-
Filesize
76B
MD58269bced11df04e3a1fb05a52624dc69
SHA16427d5cd07cbee68ec0d27f0a96c9f4f7674f993
SHA2563b3ca2a5ad4c90c8d104ded04db4d90dec31f498cb61bc6094ca9633ff970446
SHA5122ab11dfc8e8016beee78a7a98999426c96b41536976a86dc8006a097e36dc8ec233dd8d81f41bc75ad1b074e551adba67be265dbccc9c7ba1511bc3f19dcd0aa