Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2023, 03:10
Behavioral task
behavioral1
Sample
2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe
Resource
win10v2004-20231023-en
General
-
Target
2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe
-
Size
1.1MB
-
MD5
b3f66a6ba3251b95cdaaa4adbd7595c5
-
SHA1
ed2881d16575dad2da816772b3c269aabd54c50c
-
SHA256
2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6
-
SHA512
914b8029ea5521c7ba993ef5088980913eb1d44f5f00deb8268d05d0da580d6d3c163eba2f78ccfb37f451b5db7e96f6d4be9a4ddb86eceedf6bdd394f6efc56
-
SSDEEP
12288:ZEmC92VnpahSR7BwkASR49lkQHMIWnDp2f47z4PUUhyVb4yDKUgM03qcmT1Pd2K8:ZEF96C6BwkP2lsl8fEQemdM03zmT1Pe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-984744499-3605095035-265325720-1000\Control Panel\International\Geo\Nation 2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe -
resource yara_rule behavioral2/memory/1080-0-0x0000000000150000-0x000000000028C000-memory.dmp upx behavioral2/memory/1080-35-0x0000000000150000-0x000000000028C000-memory.dmp upx -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\System32\DFDWizQpN.sys MRINFO.EXE File created C:\Windows\System32\Windows.Internal.CapturePicker7AH9.sys MRINFO.EXE File created C:\Windows\System32\devrtl2Ih.sys MRINFO.EXE File created C:\Windows\System32\Windows.Graphics.PrintingKoj.sys MRINFO.EXE -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\WindowRedSystem83.log MRINFO.EXE File opened for modification C:\Windows\WindowsShell31411.log 2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe File opened for modification C:\Windows\WindowSystemNewUpdate43.log typeperf.exe File opened for modification C:\Windows\WindowsShell52877.log typeperf.exe File opened for modification C:\Windows\WindowSystemNewUpdate718.log typeperf.exe File opened for modification C:\Windows\WindowTerminalVaild45.log typeperf.exe File opened for modification C:\Windows\WindowMicrosoftNET843.log typeperf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 4 IoCs
pid Process 640 Process not Found 640 Process not Found 640 Process not Found 640 Process not Found -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1080 2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe Token: SeDebugPrivilege 3960 typeperf.exe Token: SeIncBasePriorityPrivilege 1080 2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe Token: SeDebugPrivilege 3960 typeperf.exe Token: SeDebugPrivilege 3960 typeperf.exe Token: SeDebugPrivilege 3960 typeperf.exe Token: SeDebugPrivilege 3960 typeperf.exe Token: SeDebugPrivilege 3960 typeperf.exe Token: SeDebugPrivilege 3960 typeperf.exe Token: SeDebugPrivilege 4076 MRINFO.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1080 wrote to memory of 3960 1080 2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe 89 PID 1080 wrote to memory of 3960 1080 2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe 89 PID 1080 wrote to memory of 3960 1080 2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe 89 PID 1080 wrote to memory of 3960 1080 2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe 89 PID 1080 wrote to memory of 3960 1080 2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe 89 PID 1080 wrote to memory of 3960 1080 2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe 89 PID 1080 wrote to memory of 872 1080 2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe 100 PID 1080 wrote to memory of 872 1080 2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe 100 PID 1080 wrote to memory of 872 1080 2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe 100 PID 3960 wrote to memory of 3360 3960 typeperf.exe 115 PID 3960 wrote to memory of 3360 3960 typeperf.exe 115 PID 3960 wrote to memory of 3360 3960 typeperf.exe 115 PID 3960 wrote to memory of 3360 3960 typeperf.exe 115 PID 3960 wrote to memory of 3360 3960 typeperf.exe 115 PID 3960 wrote to memory of 3360 3960 typeperf.exe 115 PID 3360 wrote to memory of 4076 3360 user.exe 116 PID 3360 wrote to memory of 4076 3360 user.exe 116 PID 3360 wrote to memory of 4076 3360 user.exe 116 PID 3960 wrote to memory of 4076 3960 typeperf.exe 116 PID 3960 wrote to memory of 4076 3960 typeperf.exe 116 PID 3960 wrote to memory of 4076 3960 typeperf.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe"C:\Users\Admin\AppData\Local\Temp\2cc2025a77f77428dc0145b9c1d27a0ba00944dacfefed830796c9d1ea37d5c6.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\typeperf.exe"C:\Windows\SysWOW64\typeperf.exe"2⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Windows\SysWOW64\user.exe"C:\Windows\SysWOW64\user.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\SysWOW64\MRINFO.EXE"C:\Windows\SysWOW64\MRINFO.EXE"4⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:4076
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\2CC202~1.EXE > nul2⤵PID:872
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7KB
MD5398bb65e6520fb9dc4177617f011e69e
SHA1ab6d0762b8b2163ff9bbbbff45a487d4246d61ff
SHA256fb6d8478334ae6ea72b799170188cad8573c9baf8a677e58f901f6a01993d5a8
SHA512e9a3be84c461a96ee533a70304a71e95130b067cbe43fe2812d9d4158537d443f1c00e759c96ae3e48369fba47537f47d8d84533fe481e67f252bba6b2283ff2