Analysis
-
max time kernel
71s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19-12-2023 13:50
Static task
static1
Behavioral task
behavioral1
Sample
39668f1f623383d85e1b3fefa689ccd8.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
39668f1f623383d85e1b3fefa689ccd8.exe
Resource
win10v2004-20231215-en
General
-
Target
39668f1f623383d85e1b3fefa689ccd8.exe
-
Size
430KB
-
MD5
39668f1f623383d85e1b3fefa689ccd8
-
SHA1
c19136d3fbd2848ae15530896c208ebb725e9d19
-
SHA256
65907c6254e30913a33ce9b71a1644d9730eff4b450a7aa6830e184ebfca76af
-
SHA512
d167991b38c3acd44ee4ec29e3cb26fb8f8ebe8a1e45f77046865e981d767b3dd0665d4663ac427d36945fa4538d7c34e3320abc4a8f5507bad7acf19c8c7392
-
SSDEEP
12288:ibee0PGl89WazvzkmMxM+ltxQMAn0Iv1b70ZSf2q:2edGBazvZMHltxtIv1bUS+q
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 39668f1f623383d85e1b3fefa689ccd8.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Winder.lnk 39668f1f623383d85e1b3fefa689ccd8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\39668f1f623383d85e1b3fefa689ccd8.exe = "C:\\System32\\39668f1f623383d85e1b3fefa689ccd8.exe" 39668f1f623383d85e1b3fefa689ccd8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000_Classes\Local Settings 39668f1f623383d85e1b3fefa689ccd8.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2720 39668f1f623383d85e1b3fefa689ccd8.exe 2720 39668f1f623383d85e1b3fefa689ccd8.exe 2720 39668f1f623383d85e1b3fefa689ccd8.exe 2720 39668f1f623383d85e1b3fefa689ccd8.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2720 39668f1f623383d85e1b3fefa689ccd8.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2720 39668f1f623383d85e1b3fefa689ccd8.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2720 39668f1f623383d85e1b3fefa689ccd8.exe 2720 39668f1f623383d85e1b3fefa689ccd8.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2720 wrote to memory of 4000 2720 39668f1f623383d85e1b3fefa689ccd8.exe 91 PID 2720 wrote to memory of 4000 2720 39668f1f623383d85e1b3fefa689ccd8.exe 91 PID 2720 wrote to memory of 4000 2720 39668f1f623383d85e1b3fefa689ccd8.exe 91 PID 2720 wrote to memory of 4724 2720 39668f1f623383d85e1b3fefa689ccd8.exe 90 PID 2720 wrote to memory of 4724 2720 39668f1f623383d85e1b3fefa689ccd8.exe 90 PID 2720 wrote to memory of 4724 2720 39668f1f623383d85e1b3fefa689ccd8.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\39668f1f623383d85e1b3fefa689ccd8.exe"C:\Users\Admin\AppData\Local\Temp\39668f1f623383d85e1b3fefa689ccd8.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"2⤵PID:4724
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"2⤵PID:4000
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
653B
MD5f6e184bb3d0befdaa7e03613203ef96e
SHA18b2ffe7ba20056b61b6c99a3844ec36e3d977a2f
SHA2564adf8e79e96d21b58b548b6a8575e56bcf477e272ea0aced2a46c95ce1600b8f
SHA512463c989e0b680bb7e1d95fa0c531265b720824f9378c53907bd57298d41786f972ca06462fa13c4799bac2d62a6942d42a0cbc6c5c63c15ea99c5be2b433daaf