Analysis
-
max time kernel
138s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2023 22:01
Static task
static1
Behavioral task
behavioral1
Sample
1df3ca3f121e7606f16c05fbec1f2d97925002242cf534118f522664ba689a52.exe
Resource
win7-20231023-en
General
-
Target
1df3ca3f121e7606f16c05fbec1f2d97925002242cf534118f522664ba689a52.exe
-
Size
275KB
-
MD5
1669261e33a42f156e7480fcc5f10972
-
SHA1
78e1200116b4dbfde22cc0283ed83c27f47c383f
-
SHA256
1df3ca3f121e7606f16c05fbec1f2d97925002242cf534118f522664ba689a52
-
SHA512
bea5cb46df4d6c9608459144fe6f0dc5574ab39ec643ba1ca559c8ee0adfb4be25df94ee75aee60f65ac3f2aabb5667c6da13239ac4a88bc82ee1a0453a42e60
-
SSDEEP
3072:/9xVbJJP04OhKkd05278dQoT+pkM4/L3ss4rVKUEA9XvVyTRqRlVfccHAC/p4KCK:Ld30V50kAT+mM4/rssw37DRlVfciz5
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350690463-3549324357-1323838019-1000\Control Panel\International\Geo\Nation 1df3ca3f121e7606f16c05fbec1f2d97925002242cf534118f522664ba689a52.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4452 3540 WerFault.exe 32 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1df3ca3f121e7606f16c05fbec1f2d97925002242cf534118f522664ba689a52.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1df3ca3f121e7606f16c05fbec1f2d97925002242cf534118f522664ba689a52.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3780 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3540 1df3ca3f121e7606f16c05fbec1f2d97925002242cf534118f522664ba689a52.exe 3540 1df3ca3f121e7606f16c05fbec1f2d97925002242cf534118f522664ba689a52.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3540 wrote to memory of 348 3540 1df3ca3f121e7606f16c05fbec1f2d97925002242cf534118f522664ba689a52.exe 90 PID 3540 wrote to memory of 348 3540 1df3ca3f121e7606f16c05fbec1f2d97925002242cf534118f522664ba689a52.exe 90 PID 3540 wrote to memory of 348 3540 1df3ca3f121e7606f16c05fbec1f2d97925002242cf534118f522664ba689a52.exe 90 PID 348 wrote to memory of 3780 348 cmd.exe 93 PID 348 wrote to memory of 3780 348 cmd.exe 93 PID 348 wrote to memory of 3780 348 cmd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1df3ca3f121e7606f16c05fbec1f2d97925002242cf534118f522664ba689a52.exe"C:\Users\Admin\AppData\Local\Temp\1df3ca3f121e7606f16c05fbec1f2d97925002242cf534118f522664ba689a52.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1df3ca3f121e7606f16c05fbec1f2d97925002242cf534118f522664ba689a52.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:348 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:3780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3540 -s 22962⤵
- Program crash
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 3540 -ip 35401⤵PID:2336