Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
05/11/2023, 02:37
Static task
static1
Behavioral task
behavioral1
Sample
0b6d6c864ad381d1651da19a7ada03e2f44bf1260715364983c3aad403ec6e18.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
0b6d6c864ad381d1651da19a7ada03e2f44bf1260715364983c3aad403ec6e18.exe
Resource
win10v2004-20231023-en
General
-
Target
0b6d6c864ad381d1651da19a7ada03e2f44bf1260715364983c3aad403ec6e18.exe
-
Size
1.2MB
-
MD5
a1ef9acfab2f8452de7d9505244d0151
-
SHA1
96733b186ac3cf3b80f57a1c1332282f10783e01
-
SHA256
0b6d6c864ad381d1651da19a7ada03e2f44bf1260715364983c3aad403ec6e18
-
SHA512
cb29adc0de5e9268cfce0f18361f4055cc88bb969c78a318b36eb93fb19a94253d36207e264fcf9500a1be06cbd45db9ccdded2237bb05e47a27ada61fd2f349
-
SSDEEP
24576:GHXXX/XXXFqIIIcXXX5j2XXXcXXXfXXXxXXXLIII+Ph2kkkkK4kXkkkkkkkkhLXI:G9qIIIUjfIIIAbazR0vKLXZR
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation 0b6d6c864ad381d1651da19a7ada03e2f44bf1260715364983c3aad403ec6e18.exe -
Executes dropped EXE 1 IoCs
pid Process 2280 uauhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\uauhost.exe 0b6d6c864ad381d1651da19a7ada03e2f44bf1260715364983c3aad403ec6e18.exe File opened for modification C:\Windows\Debug\uauhost.exe 0b6d6c864ad381d1651da19a7ada03e2f44bf1260715364983c3aad403ec6e18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 uauhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz uauhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2032 0b6d6c864ad381d1651da19a7ada03e2f44bf1260715364983c3aad403ec6e18.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2032 wrote to memory of 2608 2032 0b6d6c864ad381d1651da19a7ada03e2f44bf1260715364983c3aad403ec6e18.exe 92 PID 2032 wrote to memory of 2608 2032 0b6d6c864ad381d1651da19a7ada03e2f44bf1260715364983c3aad403ec6e18.exe 92 PID 2032 wrote to memory of 2608 2032 0b6d6c864ad381d1651da19a7ada03e2f44bf1260715364983c3aad403ec6e18.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b6d6c864ad381d1651da19a7ada03e2f44bf1260715364983c3aad403ec6e18.exe"C:\Users\Admin\AppData\Local\Temp\0b6d6c864ad381d1651da19a7ada03e2f44bf1260715364983c3aad403ec6e18.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\0B6D6C~1.EXE > nul2⤵PID:2608
-
-
C:\Windows\Debug\uauhost.exeC:\Windows\Debug\uauhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2280
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD550e2afdd015c31095e21d998c6bdc21f
SHA1cff78c19b8905101e38a0155435cd0a4f96f3943
SHA256baebe20f65837f9e2d2cf53aa67c02ad930214a557f7aacc80351f5dc3ec9f98
SHA5129e4223cc353cd79a7105f20f7605067ab6a528609b97ed5d6c39cc3aa55adc4c54af76a28ba27bcd435821cf905948b3d81beb8060acf617a164219299325428
-
Filesize
1.2MB
MD550e2afdd015c31095e21d998c6bdc21f
SHA1cff78c19b8905101e38a0155435cd0a4f96f3943
SHA256baebe20f65837f9e2d2cf53aa67c02ad930214a557f7aacc80351f5dc3ec9f98
SHA5129e4223cc353cd79a7105f20f7605067ab6a528609b97ed5d6c39cc3aa55adc4c54af76a28ba27bcd435821cf905948b3d81beb8060acf617a164219299325428