Analysis
-
max time kernel
139s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
12/11/2023, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
sysclean.exe
Resource
win10v2004-20231023-en
General
-
Target
sysclean.exe
-
Size
87KB
-
MD5
00574aa7ce6ffde342958d07c032a1ee
-
SHA1
b9a0b8fabc4b41b4b2a807f8f0e6afb703ae2c30
-
SHA256
27baf4f1ae8209cf198547d50a550d3827a654df447a915ee8a00d804b166d2e
-
SHA512
c573fb8cdab2ab00f4fb20ef525a2d4e1083054ce89982742915cbb385cc62af873cd0ff5cecd15f03cdc52e38ce58e5aef1f842014920808499fa9d91ba51ee
-
SSDEEP
1536:y7fPGykbOqjoHm4pICdfkLtAfupcWX50MxFY+yIOlnToIfa:wq6+ouCpk2mpcWJ0r+QNTBfa
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3125601242-331447593-1512828465-1000\Control Panel\International\Geo\Nation sysclean.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 4484 PING.EXE 3912 PING.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1000 wrote to memory of 2136 1000 sysclean.exe 92 PID 1000 wrote to memory of 2136 1000 sysclean.exe 92 PID 2136 wrote to memory of 3912 2136 cmd.exe 95 PID 2136 wrote to memory of 3912 2136 cmd.exe 95 PID 2136 wrote to memory of 4484 2136 cmd.exe 96 PID 2136 wrote to memory of 4484 2136 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\sysclean.exe"C:\Users\Admin\AppData\Local\Temp\sysclean.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\system32\cmd.exe"C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\C285.tmp\C295.tmp\C296.bat C:\Users\Admin\AppData\Local\Temp\sysclean.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:3912
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:4484
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111B
MD51418f8f753a323f07977b778052bc9fe
SHA124831d8b35fb14062c9c0b83c1fa43b0b521242e
SHA256f05edd34f5ff291ec9ecdbe6b650ac3c098b761bd179a6ec5e5760e30aea0ba2
SHA51261d3cf280a3c9b2fcfb889640ba65e7526748e74b5eaa64ec9a3a74bad3874eb361ac8b6f962bfb30721d697b2e94831a544ea7095128b4a41c27cdde87838b2