Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 11:40
Static task
static1
Behavioral task
behavioral1
Sample
89492116149f764224766a6d7a8782a3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
89492116149f764224766a6d7a8782a3.exe
Resource
win10v2004-20231215-en
General
-
Target
89492116149f764224766a6d7a8782a3.exe
-
Size
430KB
-
MD5
89492116149f764224766a6d7a8782a3
-
SHA1
da9883f8d4860ba35a3af68d97537fec30770391
-
SHA256
a4a6eaa1affd1edc04c624aea49e517cdaad3453535c6f2213610bb7224836cb
-
SHA512
8880888453f66bc70f88882cb02bd1c6f9a84283572ab9031403369f63c10f42b0dbd6f51aa5679c0eda099b018cc5b174296800767d03061b9ca1716c6092e9
-
SSDEEP
12288:ibee0PGl89WazvzkmMxM+ltxQMAn0Iv1b70ZSf2o:2edGBazvZMHltxtIv1bUS+o
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 89492116149f764224766a6d7a8782a3.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Winder.lnk 89492116149f764224766a6d7a8782a3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\89492116149f764224766a6d7a8782a3.exe = "C:\\System32\\89492116149f764224766a6d7a8782a3.exe" 89492116149f764224766a6d7a8782a3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000_Classes\Local Settings 89492116149f764224766a6d7a8782a3.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2716 89492116149f764224766a6d7a8782a3.exe 2716 89492116149f764224766a6d7a8782a3.exe 2716 89492116149f764224766a6d7a8782a3.exe 2716 89492116149f764224766a6d7a8782a3.exe 2716 89492116149f764224766a6d7a8782a3.exe 2716 89492116149f764224766a6d7a8782a3.exe 2716 89492116149f764224766a6d7a8782a3.exe 2716 89492116149f764224766a6d7a8782a3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2716 89492116149f764224766a6d7a8782a3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2716 89492116149f764224766a6d7a8782a3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2716 89492116149f764224766a6d7a8782a3.exe 2716 89492116149f764224766a6d7a8782a3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2716 wrote to memory of 1552 2716 89492116149f764224766a6d7a8782a3.exe 93 PID 2716 wrote to memory of 1552 2716 89492116149f764224766a6d7a8782a3.exe 93 PID 2716 wrote to memory of 1552 2716 89492116149f764224766a6d7a8782a3.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\89492116149f764224766a6d7a8782a3.exe"C:\Users\Admin\AppData\Local\Temp\89492116149f764224766a6d7a8782a3.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS1.vbs"2⤵PID:1552
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
653B
MD51f7093b2934f39cbdfebb654b0f57275
SHA16ac2b92c48a23d452f8c78aff8dbf83c89d35992
SHA256d069264c81c768495e25951628f4dbbcb387ff88b82d5770707a1fea09aa8dee
SHA5125de782cee42e082d4c647f9244b6346d81285e23b075fdcbc4634607279f921cfb13cecbfd06ea36fd86f20facc303f73fc99817dabcd6b33beac8664bc6cad2