Analysis
-
max time kernel
141s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
16/11/2023, 03:19
Static task
static1
Behavioral task
behavioral1
Sample
3f1ba0dace898dc2cee247de5e15f068.exe
Resource
win7-20231023-en
General
-
Target
3f1ba0dace898dc2cee247de5e15f068.exe
-
Size
252KB
-
MD5
3f1ba0dace898dc2cee247de5e15f068
-
SHA1
e1fe1e8a75d490ea13736b38133a1ba930dca7e1
-
SHA256
2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a
-
SHA512
6ac4813ecbdcaa09659977508b7a97c7b0ec6322ba0a75b502ca07bc0a91759f07cc755f5348502f70cb7c9fcf1fffc0f96bd9b45ceeb254829cdca87a62f59a
-
SSDEEP
3072:Bjf6OLLuaZj8wp6wPZ0FHQzzdoPCU1C6g2Okt6iZ0R2RYcBXSJckSHCAu:5LLXZLGHQz53U1C6gJYRnCJ
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation 3f1ba0dace898dc2cee247de5e15f068.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2348 3632 WerFault.exe 86 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 3f1ba0dace898dc2cee247de5e15f068.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3f1ba0dace898dc2cee247de5e15f068.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3268 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3632 3f1ba0dace898dc2cee247de5e15f068.exe 3632 3f1ba0dace898dc2cee247de5e15f068.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4268 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3632 wrote to memory of 4408 3632 3f1ba0dace898dc2cee247de5e15f068.exe 98 PID 3632 wrote to memory of 4408 3632 3f1ba0dace898dc2cee247de5e15f068.exe 98 PID 3632 wrote to memory of 4408 3632 3f1ba0dace898dc2cee247de5e15f068.exe 98 PID 4408 wrote to memory of 3268 4408 cmd.exe 102 PID 4408 wrote to memory of 3268 4408 cmd.exe 102 PID 4408 wrote to memory of 3268 4408 cmd.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f1ba0dace898dc2cee247de5e15f068.exe"C:\Users\Admin\AppData\Local\Temp\3f1ba0dace898dc2cee247de5e15f068.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\3f1ba0dace898dc2cee247de5e15f068.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:3268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3632 -s 21162⤵
- Program crash
PID:2348
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 3632 -ip 36321⤵PID:3416
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:1836
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5958d28cb747b14b3484217875b9d238c
SHA16a0a0074be24856d42d350ecba738a650f47fafd
SHA256b618b95d7076f55c798d880be0d4fb58824e5a73ac987caf0e6012466898c46a
SHA51271eb1adb559ca866b356e31c223c0f0204fc016243b1ba4a8c7f4a0eaf3ef1524b82d63e732eb7233279ae56abad4d43b70ee23c9f28142a01cfdfa32feeabe8