Analysis
-
max time kernel
157s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 11:28
Behavioral task
behavioral1
Sample
142c97e3309f96d734f83d5669005670.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
142c97e3309f96d734f83d5669005670.exe
Resource
win10v2004-20231215-en
General
-
Target
142c97e3309f96d734f83d5669005670.exe
-
Size
405KB
-
MD5
142c97e3309f96d734f83d5669005670
-
SHA1
ab5b9c8bcc86efd2d39674e2b7025ae8f4a4fe5e
-
SHA256
280c24a73764a85c57dc7a1ff2b30dc378923dad5c84c413c85751d7bde2c037
-
SHA512
db64bbb0297fd53b19ea1c6560a75ca64059189db0a208781d76c5a140e6c2fefbad087b84b4df994d47c2d201eaee99c6237f63b64ab081d377940485610d40
-
SSDEEP
6144:OEcvV4Fustn8MnUI8/wkkqxkEpiMkR9ve/wwxxkl:OBV4FustW4kkbEpiMk3ve46Wl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 142c97e3309f96d734f83d5669005670.exe -
Deletes itself 1 IoCs
pid Process 1644 Sysceamfwire.exe -
Executes dropped EXE 1 IoCs
pid Process 1644 Sysceamfwire.exe -
resource yara_rule behavioral2/memory/1684-0-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/files/0x000400000001e7e3-10.dat upx behavioral2/memory/1684-41-0x0000000000400000-0x0000000000468000-memory.dmp upx behavioral2/memory/1644-42-0x0000000000400000-0x0000000000468000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 142c97e3309f96d734f83d5669005670.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe 1644 Sysceamfwire.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1644 1684 142c97e3309f96d734f83d5669005670.exe 91 PID 1684 wrote to memory of 1644 1684 142c97e3309f96d734f83d5669005670.exe 91 PID 1684 wrote to memory of 1644 1684 142c97e3309f96d734f83d5669005670.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\142c97e3309f96d734f83d5669005670.exe"C:\Users\Admin\AppData\Local\Temp\142c97e3309f96d734f83d5669005670.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Sysceamfwire.exe"C:\Users\Admin\AppData\Local\Temp\Sysceamfwire.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405KB
MD53335a5fc0bc899656cf8f8eed54e74cb
SHA172469df91a7dd96394f386f147b7a1a5e477bc9a
SHA256ca0b1822c1bdbe0b1c5b20337b8f107b1d28594ed1191128928bc039c6094c13
SHA5124ea9efcbf6cf5a38d56b4ddf56bd67ac7bb0a342c615dfc855b2ab8128b8fac4f78c36441ef5def789e52b9bca0586405683e81d065f46dde3bff11e0f3e4512
-
Filesize
70B
MD5589533fdcf5f836dfbc86b4b68a6c080
SHA1971ebe7a0080190964fc574886a0e3947952c13b
SHA256f6def41913e4ef793d96a1fa664d15f279371f7593b104954dde17b1f204f16d
SHA512c44338e58bf295540102fef7d4e20b1da528140ac8b618a49777c34ad6628e9d106ea90a9336ad4d7af7bccf8ebbe77bf24da40f80929a7b39e36cb4f6b292a4