Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
23/11/2023, 18:31
Static task
static1
General
-
Target
1b64126ea9a672c967f64b6b379d3a1643bfda0da2bd58f66b07e16c8fd1946d.exe
-
Size
275KB
-
MD5
dda4fb7debe83135087e6e1965982cff
-
SHA1
1f5046d4f5ef48a414ec8b3f0e6bd852535fb5ca
-
SHA256
1b64126ea9a672c967f64b6b379d3a1643bfda0da2bd58f66b07e16c8fd1946d
-
SHA512
897d7b62af3786b74be87908b3c4d38b5c901082dcbef9073773cfa765331330750109b3009d149836a748f72c56d265f9576402fa8693befc89678e28b6ac74
-
SSDEEP
3072:BHN0wp7/AcRnTG1ytiiGa9k9Kap7q9lSMCMc0Ml92PtjAVFUpxzS:kkjDnqDasKap7qeM1cD9WtjW0x
Malware Config
Signatures
-
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1873812795-1433807462-1429862679-1000\Control Panel\International\Geo\Nation 1b64126ea9a672c967f64b6b379d3a1643bfda0da2bd58f66b07e16c8fd1946d.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 1b64126ea9a672c967f64b6b379d3a1643bfda0da2bd58f66b07e16c8fd1946d.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 1b64126ea9a672c967f64b6b379d3a1643bfda0da2bd58f66b07e16c8fd1946d.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3668 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3636 1b64126ea9a672c967f64b6b379d3a1643bfda0da2bd58f66b07e16c8fd1946d.exe 3636 1b64126ea9a672c967f64b6b379d3a1643bfda0da2bd58f66b07e16c8fd1946d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3636 wrote to memory of 1020 3636 1b64126ea9a672c967f64b6b379d3a1643bfda0da2bd58f66b07e16c8fd1946d.exe 92 PID 3636 wrote to memory of 1020 3636 1b64126ea9a672c967f64b6b379d3a1643bfda0da2bd58f66b07e16c8fd1946d.exe 92 PID 3636 wrote to memory of 1020 3636 1b64126ea9a672c967f64b6b379d3a1643bfda0da2bd58f66b07e16c8fd1946d.exe 92 PID 1020 wrote to memory of 3668 1020 cmd.exe 95 PID 1020 wrote to memory of 3668 1020 cmd.exe 95 PID 1020 wrote to memory of 3668 1020 cmd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\1b64126ea9a672c967f64b6b379d3a1643bfda0da2bd58f66b07e16c8fd1946d.exe"C:\Users\Admin\AppData\Local\Temp\1b64126ea9a672c967f64b6b379d3a1643bfda0da2bd58f66b07e16c8fd1946d.exe"1⤵
- Checks computer location settings
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\1b64126ea9a672c967f64b6b379d3a1643bfda0da2bd58f66b07e16c8fd1946d.exe" & del "C:\ProgramData\*.dll"" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\timeout.exetimeout /t 53⤵
- Delays execution with timeout.exe
PID:3668
-
-