Analysis
-
max time kernel
180s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
31-10-2023 14:06
Behavioral task
behavioral1
Sample
a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe
Resource
win10v2004-20231023-en
General
-
Target
a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe
-
Size
13.2MB
-
MD5
cee9523a74b4194c78a7f37bb0208a73
-
SHA1
b6df4c0d84e6d428194a6ce78cef0b531cede6a4
-
SHA256
a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334
-
SHA512
095032d2760991be3bced533d9a7271808aec8f692ce95d18e67248f0f298e2ba23b42d587e0a55b22b7ab66aca76a4cbaf7022fd3e621d66b9bd27efbc1b2db
-
SSDEEP
393216:X0F8bllcRm5iLwvVDfzTj/sbazGV6Xg/XINSjgyNm:X0F8vcRm5WwvdzTjE6FqINDyI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe -
resource yara_rule behavioral2/memory/436-12-0x0000000000400000-0x0000000003D9B000-memory.dmp upx behavioral2/memory/436-15-0x0000000000400000-0x0000000003D9B000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\INF\c_volume.PNF a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe File created C:\Windows\INF\c_monitor.PNF a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe File created C:\Windows\INF\c_diskdrive.PNF a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe File created C:\Windows\INF\c_media.PNF a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe File created C:\Windows\INF\c_display.PNF a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe File created C:\Windows\INF\c_processor.PNF a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 14 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\FriendlyName a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Driver a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\LocationInformation a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Address a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\DeviceDesc a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Address a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\DeviceDesc a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\Driver a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\LocationInformation a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BaseBoardProduct a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe Key opened \REGISTRY\MACHINE\Hardware\DESCRIPTION\System\BIOS a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 664 Process not Found -
Suspicious use of FindShellTrayWindow 15 IoCs
pid Process 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe -
Suspicious use of SendNotifyMessage 15 IoCs
pid Process 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 436 wrote to memory of 60 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 93 PID 436 wrote to memory of 60 436 a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe 93 PID 60 wrote to memory of 3948 60 ie4uinit.exe 94 PID 60 wrote to memory of 3948 60 ie4uinit.exe 94 PID 60 wrote to memory of 3192 60 ie4uinit.exe 95 PID 60 wrote to memory of 3192 60 ie4uinit.exe 95 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe"C:\Users\Admin\AppData\Local\Temp\a7a15e4f9a806939a63de8ad1941ec68b8e33e65fc00e5cf212bb3aacc3a2334.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Checks SCSI registry key(s)
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\System32\ie4uinit.exe"C:\Windows\System32\ie4uinit.exe" -ClearIconCache2⤵
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m /03⤵PID:3948
-
-
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe C:\Windows\system32\migration\WininetPlugin.dll,MigrateCacheForUser /m /03⤵PID:3192
-
-