Analysis
-
max time kernel
148s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231025-en -
resource tags
arch:x64arch:x86image:win10v2004-20231025-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2023, 21:16
Static task
static1
Behavioral task
behavioral1
Sample
2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a.exe
Resource
win7-20231020-en
General
-
Target
2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a.exe
-
Size
252KB
-
MD5
3f1ba0dace898dc2cee247de5e15f068
-
SHA1
e1fe1e8a75d490ea13736b38133a1ba930dca7e1
-
SHA256
2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a
-
SHA512
6ac4813ecbdcaa09659977508b7a97c7b0ec6322ba0a75b502ca07bc0a91759f07cc755f5348502f70cb7c9fcf1fffc0f96bd9b45ceeb254829cdca87a62f59a
-
SSDEEP
3072:Bjf6OLLuaZj8wp6wPZ0FHQzzdoPCU1C6g2Okt6iZ0R2RYcBXSJckSHCAu:5LLXZLGHQz53U1C6gJYRnCJ
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-177160434-2093019976-369403398-1000\Control Panel\International\Geo\Nation 2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1948 3468 WerFault.exe 85 -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 640 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3468 2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a.exe 3468 2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3468 wrote to memory of 752 3468 2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a.exe 90 PID 3468 wrote to memory of 752 3468 2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a.exe 90 PID 3468 wrote to memory of 752 3468 2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a.exe 90 PID 752 wrote to memory of 640 752 cmd.exe 94 PID 752 wrote to memory of 640 752 cmd.exe 94 PID 752 wrote to memory of 640 752 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a.exe"C:\Users\Admin\AppData\Local\Temp\2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\2057c7a12abf4e22415003004e057868610c699809b749f10aa9708b4c81157a.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:640
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3468 -s 23042⤵
- Program crash
PID:1948
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 440 -p 3468 -ip 34681⤵PID:868