Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
30/10/2023, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe
Resource
win10v2004-20231020-en
General
-
Target
24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe
-
Size
399KB
-
MD5
915b603cf3096bdd238cfe0a03922b64
-
SHA1
d95e627f5f08f1b23a8ed595dc3b13129daa7545
-
SHA256
24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726
-
SHA512
017aa2ebacb45120dddbb3c17c4836d947b7921b6c2f966331158aa2fe78b1da40e077805a4c0b4c23f8ddc5ef0f76184948390f771b59c86a94998ab463c75f
-
SSDEEP
12288:CKwdk5r64i/IIjavqLJbgdoNaJCxtNPl6:CKkk5r64igFvoQJQtNd6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3811856890-180006922-3689258494-1000\Control Panel\International\Geo\Nation 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe -
Executes dropped EXE 3 IoCs
pid Process 1260 TrZVmTFKaJ.exe 4704 TrZVmTFKaJ.exe 2380 TrZVmTFKaJ.exe -
resource yara_rule behavioral2/memory/2380-22-0x0000000000820000-0x000000000082B000-memory.dmp upx behavioral2/memory/2380-25-0x0000000000820000-0x000000000082B000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\TrZVmTFKaJ.exe 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe File opened for modification C:\Windows\SysWOW64\TrZVmTFKaJ.exe 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe File created C:\Windows\SysWOW64\TrZVmTFKaJ.exe TrZVmTFKaJ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4352 2380 WerFault.exe 90 -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe 1260 TrZVmTFKaJ.exe 1260 TrZVmTFKaJ.exe 4704 TrZVmTFKaJ.exe 4704 TrZVmTFKaJ.exe 2380 TrZVmTFKaJ.exe 2380 TrZVmTFKaJ.exe 2380 TrZVmTFKaJ.exe 2380 TrZVmTFKaJ.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe 1260 TrZVmTFKaJ.exe 1260 TrZVmTFKaJ.exe 4704 TrZVmTFKaJ.exe 4704 TrZVmTFKaJ.exe 2380 TrZVmTFKaJ.exe 2380 TrZVmTFKaJ.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4060 wrote to memory of 1260 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe 88 PID 4060 wrote to memory of 1260 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe 88 PID 4060 wrote to memory of 1260 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe 88 PID 4704 wrote to memory of 2380 4704 TrZVmTFKaJ.exe 90 PID 4704 wrote to memory of 2380 4704 TrZVmTFKaJ.exe 90 PID 4704 wrote to memory of 2380 4704 TrZVmTFKaJ.exe 90 PID 4060 wrote to memory of 1660 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe 91 PID 4060 wrote to memory of 1660 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe 91 PID 4060 wrote to memory of 1660 4060 24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe"C:\Users\Admin\AppData\Local\Temp\24c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\SysWOW64\TrZVmTFKaJ.exe-auto2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1260
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" cmd/cping-n2127.0.0.1>nulC:\Users\Admin\AppData\Local\Temp\[email protected]>nul2⤵PID:1660
-
-
C:\Windows\SysWOW64\TrZVmTFKaJ.exeC:\Windows\SysWOW64\TrZVmTFKaJ.exe Service 11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\TrZVmTFKaJ.exe-a12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2380 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 9043⤵
- Program crash
PID:4352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2380 -ip 23801⤵PID:3308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
399KB
MD5915b603cf3096bdd238cfe0a03922b64
SHA1d95e627f5f08f1b23a8ed595dc3b13129daa7545
SHA25624c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726
SHA512017aa2ebacb45120dddbb3c17c4836d947b7921b6c2f966331158aa2fe78b1da40e077805a4c0b4c23f8ddc5ef0f76184948390f771b59c86a94998ab463c75f
-
Filesize
399KB
MD5915b603cf3096bdd238cfe0a03922b64
SHA1d95e627f5f08f1b23a8ed595dc3b13129daa7545
SHA25624c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726
SHA512017aa2ebacb45120dddbb3c17c4836d947b7921b6c2f966331158aa2fe78b1da40e077805a4c0b4c23f8ddc5ef0f76184948390f771b59c86a94998ab463c75f
-
Filesize
399KB
MD5915b603cf3096bdd238cfe0a03922b64
SHA1d95e627f5f08f1b23a8ed595dc3b13129daa7545
SHA25624c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726
SHA512017aa2ebacb45120dddbb3c17c4836d947b7921b6c2f966331158aa2fe78b1da40e077805a4c0b4c23f8ddc5ef0f76184948390f771b59c86a94998ab463c75f
-
Filesize
399KB
MD5915b603cf3096bdd238cfe0a03922b64
SHA1d95e627f5f08f1b23a8ed595dc3b13129daa7545
SHA25624c665ef8b4e0210234fa029bc6efd3420ab665742528bce0ae404e483740726
SHA512017aa2ebacb45120dddbb3c17c4836d947b7921b6c2f966331158aa2fe78b1da40e077805a4c0b4c23f8ddc5ef0f76184948390f771b59c86a94998ab463c75f