Analysis
-
max time kernel
126s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/10/2023, 11:40
Static task
static1
Behavioral task
behavioral1
Sample
d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0.exe
Resource
win10v2004-20231020-en
General
-
Target
d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0.exe
-
Size
5.9MB
-
MD5
4a32b0856d2ccf844b0b41859ee54400
-
SHA1
5c3870e4d001329cd603dfe2f9e0e8e70f6210e2
-
SHA256
d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0
-
SHA512
1c9c5406c3b74408e05582892df6b73830e91815023a8e532c663d6e007daa72be72780de3a75eab9ac9f248b6bbf2647d461b79e42ba267c12beb27c67777e8
-
SSDEEP
98304:CmScH31urVCWtzSKkRNc0xqcB27OgUWZHwJ2uJBAUZLcRka:+rVCWtdkRNvxP2sWAJV4ka
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3777073499-70821052-905318652-1000\Control Panel\International\Geo\Nation d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0.exe -
Executes dropped EXE 1 IoCs
pid Process 4644 ΢ÐÅ°²×°°ü.exe -
Loads dropped DLL 1 IoCs
pid Process 3724 d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0.exe -
resource yara_rule behavioral2/memory/3724-2-0x0000000001060000-0x000000000106B000-memory.dmp upx behavioral2/memory/3724-4-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-3-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-5-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-8-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-6-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-10-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-12-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-14-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-16-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-18-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-20-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-22-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-24-0x0000000001060000-0x000000000106B000-memory.dmp upx behavioral2/memory/3724-26-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-28-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-30-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-32-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-34-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-37-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-39-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-41-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-43-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-45-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-47-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-49-0x0000000010000000-0x000000001003E000-memory.dmp upx behavioral2/memory/3724-51-0x0000000010000000-0x000000001003E000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3724 d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0.exe 3724 d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0.exe 3724 d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3724 wrote to memory of 4644 3724 d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0.exe 94 PID 3724 wrote to memory of 4644 3724 d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0.exe 94 PID 3724 wrote to memory of 4644 3724 d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0.exe"C:\Users\Admin\AppData\Local\Temp\d8dbe2e3e6fb05560a92a7d1e59e010438312e4c8e2dfa02bda34864edf2e2b0.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\Desktop\΢ÐÅ°²×°°ü.exe"C:\Users\Admin\Desktop\΢ÐÅ°²×°°ü.exe"2⤵
- Executes dropped EXE
PID:4644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.5MB
MD5ef48d7cc52338513cc0ce843c5e3916b
SHA120965d86b7b358edf8b5d819302fa7e0e6159c18
SHA256835bfef980ad0cedf10d8ade0cf5671d9f56062f2b22d0a0547b07772ceb25a8
SHA512fd4602bd487eaad5febb5b3e9d8fe75f4190d1e44e538e7ae2d2129087f35b72b254c85d7335a81854aa2bdb4f0f2fa22e02a892ee23ac57b78cdd03a79259b9
-
Filesize
11KB
MD5ca332bb753b0775d5e806e236ddcec55
SHA1f35ef76592f20850baef2ebbd3c9a2cfb5ad8d8f
SHA256df5ae79fa558dc7af244ec6e53939563b966e7dbd8867e114e928678dbd56e5d
SHA5122de0956a1ad58ad7086e427e89b819089f2a7f1e4133ed2a0a736adc0614e8588ebe2d97f1b59ab8886d662aeb40e0b4838c6a65fbfc652253e3a45664a03a00
-
Filesize
10KB
MD5b6bffed88dc920f4daccf1a83dbf7f8b
SHA19d6e4a7b272cb725a143a588e1fe7b0ca6374b0b
SHA25688e93194d4660d8c6f3f70591eef2e73ee460bbca08932cd7bec4393a6c7a36b
SHA512d603a3aca6149b8dba1a1c3ca84d09d39459c21e10d4ef25ea88807cd0901f5a749dd7f97d4d49a9211f099e689156bc9724a73ad1e73aa580d8680d6cf25d3e
-
Filesize
8KB
MD51d67dafae0fcabbdc7ffaa3095ca3b61
SHA16ea71d27c8bf64ff601585c961a65c1adc9d7775
SHA25651037184b477771ebe0558bed508315e05de95cb170a40a975d2326e97bfe88e
SHA512b1ebb5d6d68fd2c5372114494dca30eff6107e263313b8889c4ef9b3f2311d3fc0b557bbcefa6911547727eac0b345df904993561c5a6feb87426158a4684d71
-
Filesize
204B
MD51f176fd422d932b3f73c59cd0e8a4d0b
SHA1e944c5a2805bb8809ddef9402304a12e6d3a3751
SHA256f96f94e2c2d39b65dd9ca21a66abf75ed7b4c2d03bc703c5afc71fa1ea12669e
SHA5127b0b29b2e9f0e6730541d206fde7cd2a5318a227f67b25c56b3005acd30201d11cbec7ddcdd9ad2149981ae681adffa2b161e2588375447b4add74eaea7db225
-
Filesize
64B
MD549f36aa007f23eb6c74c4a2a1a3a33b1
SHA124bc012bf366135ed5b87fa1fae78d5a2995536f
SHA2562454bb119c52184d858ad28c30a7178102ede54731a482b7168f1528516dd4cb
SHA5126788124e3da25d19c0acc3f188d6e25c1eee4aaa3df0ba1aeac17a64eca3b487e6de745ad38d47aa9fa03ce1d55c7172cfd872831034da3d7aea86e88a449474
-
Filesize
211B
MD5be1ed890b76305de558c92cdec4ac2bb
SHA1f9886e1bcb55dcfcb06294141496d8ac9eb7e014
SHA256bad4ee5b9b63fd12da271a13eb1a7120a58ee3c5a4f95daef51fab68b87ba6cb
SHA5120060156b4a7fb18c5a1fd2018fe69d3a533e5c3b8d1f14920bfd6ab88ffedb799901a635a186e35f2aa605d3bcc502142363b63aad202b3928e77180e6d56dec
-
Filesize
225B
MD50e66900340fc19323c256461904893d9
SHA1daf382f14a93f5cc7a839f0d2914a7fe699cbbee
SHA2563c0466e79066d63e524f4b8f5423409a9fcfa769334cde7b1628d5f86265be10
SHA5122c446d717530e6e73c59f965b034ca9cd92409d5eeb2f60c9d001ef0f905e09864ab0448b929deea46a25bdab707ae61d45ab78c23cb37a6dc6c0eb85300b2b8
-
Filesize
113.9MB
MD5719aba291d9a14579ec705205c7c9ad7
SHA1515b8f1267ae63eecb90fefaac7b44f316157b62
SHA2569daf9ec91efd63e21ed5564a7614c409df0cb16b27ae744435dea56102229e65
SHA512f781608165f29bd00a3a2b3856677406e9754d413b5429160be8a0d0d6cd95b9275526593c12d5ceacf943642950da410a09f354f4c98042a7b197e5775992eb
-
Filesize
85.0MB
MD5c1336ed7b2dbb263f8d00e5d376e6c0e
SHA1bbba6c4ed2a12459d5947e46090aea7f2afc21e9
SHA2565f22d77686e9b58020494f0cf3444d1df502d996d1a792e02422550a811bea20
SHA512f6c7b0914b3d5870c1c476c174857a5df0835beeb967321d1614e7b8b9d570d559cd33836b39dceb22c882095451a40bad0794af92fc921d9211193cb7404ebf
-
Filesize
81.8MB
MD50bfacaefc4a5ea838cdd10c2c46bd448
SHA1dddf51a56f56e3eb11ff39abff83b9c6faecdbb2
SHA256e979a1b2ca5b11907ed44af25a8667bfffd8e46c536d752830148ef13267cbc8
SHA512caf320abefe711d0320ffed0099e7c0df2df1aeb1c5a3a38ce29581ad51dc354432d9afedfa38c2b777cafdc382ef108e56a06d6a128e9dc06385c2ad607a048