Analysis
-
max time kernel
123s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231127-en -
resource tags
arch:x64arch:x86image:win10v2004-20231127-enlocale:en-usos:windows10-2004-x64system -
submitted
11/12/2023, 03:53
Static task
static1
Behavioral task
behavioral1
Sample
1299d39a7897c363808c8b8a2737ad31f77b912b4fa5adafd9fd88c8184d8436.exe
Resource
win10v2004-20231127-en
General
-
Target
1299d39a7897c363808c8b8a2737ad31f77b912b4fa5adafd9fd88c8184d8436.exe
-
Size
2.8MB
-
MD5
6a1e10e1ab33d3b7a48eadcc36c365b5
-
SHA1
c4e584e1ffb3ee89b230c6596625de8561b1cbf6
-
SHA256
1299d39a7897c363808c8b8a2737ad31f77b912b4fa5adafd9fd88c8184d8436
-
SHA512
4079185d0b1e9ab9bddca7bc74fe4ecf2c4fa136dd3bb211b181e59cef60db0ef13468430388541fb7b1d3a7f67a290b735b420d77a4d2f92fb0014f9da5c342
-
SSDEEP
49152:cYJZxMrRnXjfvgUnsSbuWYik5IjJgFSurqtk+apUB/a4EtNPOyoIW5UGRH9X5Ne:cYJZWrRXjfvmS9j4PAapOGOjU+Ne
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3635043082-2972811465-3176142135-1000\Control Panel\International\Geo\Nation 1299d39a7897c363808c8b8a2737ad31f77b912b4fa5adafd9fd88c8184d8436.exe Key value queried \REGISTRY\USER\S-1-5-21-3635043082-2972811465-3176142135-1000\Control Panel\International\Geo\Nation cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1784 rundll32.exe 3040 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3635043082-2972811465-3176142135-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1264 wrote to memory of 3416 1264 1299d39a7897c363808c8b8a2737ad31f77b912b4fa5adafd9fd88c8184d8436.exe 89 PID 1264 wrote to memory of 3416 1264 1299d39a7897c363808c8b8a2737ad31f77b912b4fa5adafd9fd88c8184d8436.exe 89 PID 1264 wrote to memory of 3416 1264 1299d39a7897c363808c8b8a2737ad31f77b912b4fa5adafd9fd88c8184d8436.exe 89 PID 3416 wrote to memory of 2632 3416 cmd.exe 92 PID 3416 wrote to memory of 2632 3416 cmd.exe 92 PID 3416 wrote to memory of 2632 3416 cmd.exe 92 PID 2632 wrote to memory of 1784 2632 control.exe 93 PID 2632 wrote to memory of 1784 2632 control.exe 93 PID 2632 wrote to memory of 1784 2632 control.exe 93 PID 1784 wrote to memory of 3948 1784 rundll32.exe 95 PID 1784 wrote to memory of 3948 1784 rundll32.exe 95 PID 3948 wrote to memory of 3040 3948 RunDll32.exe 96 PID 3948 wrote to memory of 3040 3948 RunDll32.exe 96 PID 3948 wrote to memory of 3040 3948 RunDll32.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1299d39a7897c363808c8b8a2737ad31f77b912b4fa5adafd9fd88c8184d8436.exe"C:\Users\Admin\AppData\Local\Temp\1299d39a7897c363808c8b8a2737ad31f77b912b4fa5adafd9fd88c8184d8436.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7z876014F0\zkaDj.BAt" "2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3416 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\7z876014F0\Gc.cpl",3⤵
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7z876014F0\Gc.cpl",4⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\7z876014F0\Gc.cpl",5⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\7z876014F0\Gc.cpl",6⤵
- Loads dropped DLL
PID:3040
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3.2MB
MD516187a26a6d345fe49e1723137b021bc
SHA16d613acf0ca9134380c0a57dff0563acbb2a0abd
SHA2560453a192693e278cfb92cda59ae1711b06cc55de319911b05c8191ebfc4be154
SHA512f2aa54ace51e74d48d602f7acb24024957bc5731c272862f308aa16e4bbf5336d2b36151b0b86bb52170123d120bacaf9fea5c9b1f2d72505799856c3ae224e2
-
Filesize
49B
MD5f6edd94cf09c230158ae427a2cd12f35
SHA158daee2dc3fbc0ea048b529e55b7c104cdc928f6
SHA256ac09771515df0fe43a8a7a42574f3db41a07e9cd669798d283a4193c5d4140e2
SHA51206d33b1de92c6936c231bcb5a41565863db924ca768d886044c4ca15ae6dfe3218308f32b22a2f0181bc28bbd90789e47504127cf1f6560434ac2937a3ce8ed4