Analysis
-
max time kernel
81s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 10:34
Static task
static1
Behavioral task
behavioral1
Sample
0835d81542acc50b9579f99eca83a64d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0835d81542acc50b9579f99eca83a64d.exe
Resource
win10v2004-20231215-en
General
-
Target
0835d81542acc50b9579f99eca83a64d.exe
-
Size
430KB
-
MD5
0835d81542acc50b9579f99eca83a64d
-
SHA1
fc30d49e99f4be296d0feac5ef25bd3967b8161f
-
SHA256
ad2526deb219d4c2707553763eb672e5839b685434e2970c93bfe6551d43e18a
-
SHA512
f6f602009ddbd2b65ac69d6a05dd47167f96076f2cfcd3c87cd0951169be483bbda1848aa719a2f23c6de708e649665c5a5b0227edd71c4c5acfc4562efa1e63
-
SSDEEP
12288:ibee0PGl89WazvzkmMxM+ltxQMAn0Iv1b70ZSf2R:2edGBazvZMHltxtIv1bUS+R
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 0835d81542acc50b9579f99eca83a64d.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Winder.lnk 0835d81542acc50b9579f99eca83a64d.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\0835d81542acc50b9579f99eca83a64d.exe = "C:\\System32\\0835d81542acc50b9579f99eca83a64d.exe" 0835d81542acc50b9579f99eca83a64d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000_Classes\Local Settings 0835d81542acc50b9579f99eca83a64d.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1308 0835d81542acc50b9579f99eca83a64d.exe 1308 0835d81542acc50b9579f99eca83a64d.exe 1308 0835d81542acc50b9579f99eca83a64d.exe 1308 0835d81542acc50b9579f99eca83a64d.exe 1308 0835d81542acc50b9579f99eca83a64d.exe 1308 0835d81542acc50b9579f99eca83a64d.exe 1308 0835d81542acc50b9579f99eca83a64d.exe 1308 0835d81542acc50b9579f99eca83a64d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1308 0835d81542acc50b9579f99eca83a64d.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1308 0835d81542acc50b9579f99eca83a64d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1308 0835d81542acc50b9579f99eca83a64d.exe 1308 0835d81542acc50b9579f99eca83a64d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1308 wrote to memory of 3836 1308 0835d81542acc50b9579f99eca83a64d.exe 91 PID 1308 wrote to memory of 3836 1308 0835d81542acc50b9579f99eca83a64d.exe 91 PID 1308 wrote to memory of 3836 1308 0835d81542acc50b9579f99eca83a64d.exe 91 PID 1308 wrote to memory of 2320 1308 0835d81542acc50b9579f99eca83a64d.exe 92 PID 1308 wrote to memory of 2320 1308 0835d81542acc50b9579f99eca83a64d.exe 92 PID 1308 wrote to memory of 2320 1308 0835d81542acc50b9579f99eca83a64d.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\0835d81542acc50b9579f99eca83a64d.exe"C:\Users\Admin\AppData\Local\Temp\0835d81542acc50b9579f99eca83a64d.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"2⤵PID:3836
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"2⤵PID:2320
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
653B
MD5cfb5a7a975ee090d9736850ddc3b03a7
SHA155d71f8280c9aeb276f2172a3c4fa2f3d2f39def
SHA256599d0992f59d367afe406f79f194d5c13f299d9037c10eb23637dc4b4749f07e
SHA512673d66c44cdfa1f899a6c360a46679c15cb11f65feb728559dc982163fa655029b5267d06f6cd2c8c3034598002d188e0367eb6631fc26b704136f9a8347c239