Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2023 13:54
Static task
static1
Behavioral task
behavioral1
Sample
b144fa996dfbdb305cc673fecd8e806f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b144fa996dfbdb305cc673fecd8e806f.exe
Resource
win10v2004-20231215-en
General
-
Target
b144fa996dfbdb305cc673fecd8e806f.exe
-
Size
63KB
-
MD5
b144fa996dfbdb305cc673fecd8e806f
-
SHA1
d97c8939bed314bde89ccdd552ccb728148a10bd
-
SHA256
7819c6af1b36870d15b4b954936837b5c5a8ba57ebdee462772bd6fb9f66afc9
-
SHA512
72a8e177bc926143482556cb3c0b35a98436279daf98753ba80da52361e1480644006f318b821d2497492a3d803faf3520e551405bfb9db4c3283b8c1f1d7759
-
SSDEEP
1536:JJl0x2vMziE9caRZglZSP+QIOPnToIfwEFy:JJa0vM+la0iP+GfTBfwEFy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation b144fa996dfbdb305cc673fecd8e806f.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeBackupPrivilege 3488 Robocopy.exe Token: SeRestorePrivilege 3488 Robocopy.exe Token: SeSecurityPrivilege 3488 Robocopy.exe Token: SeTakeOwnershipPrivilege 3488 Robocopy.exe Token: SeBackupPrivilege 2516 Robocopy.exe Token: SeRestorePrivilege 2516 Robocopy.exe Token: SeSecurityPrivilege 2516 Robocopy.exe Token: SeTakeOwnershipPrivilege 2516 Robocopy.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2816 wrote to memory of 704 2816 b144fa996dfbdb305cc673fecd8e806f.exe 23 PID 2816 wrote to memory of 704 2816 b144fa996dfbdb305cc673fecd8e806f.exe 23 PID 704 wrote to memory of 3488 704 cmd.exe 20 PID 704 wrote to memory of 3488 704 cmd.exe 20 PID 704 wrote to memory of 2516 704 cmd.exe 21 PID 704 wrote to memory of 2516 704 cmd.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\b144fa996dfbdb305cc673fecd8e806f.exe"C:\Users\Admin\AppData\Local\Temp\b144fa996dfbdb305cc673fecd8e806f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\1\68AD.bat C:\Users\Admin\AppData\Local\Temp\b144fa996dfbdb305cc673fecd8e806f.exe"2⤵
- Enumerates connected drives
- Suspicious use of WriteProcessMemory
PID:704
-
-
C:\Windows\system32\Robocopy.exeRobocopy C:\users\Admin\Desktop L:\Admin\Desktop /MIR /FFT /Z /XA:SH /W:5 /XJ /Xf *.jpg *.png *.mp3 *.mp4 *.exe *.avi *.mkv *.mov *.wma *.wmv *.flv *.mpg *.divx *.wave *.m4a *.swf *.dov *.app *.bat *.com *.jar *.wsf *.iso *.dmg *.bin *.mdf *.bcd *.bak *.tmp1⤵
- Suspicious use of AdjustPrivilegeToken
PID:3488
-
C:\Windows\system32\Robocopy.exeRobocopy C:\users\Admin\Documents L:\Admin\Documents /MIR /FFT /Z /XA:SH /W:5 /XJ /Xf *.jpg *.png *.mp3 *.mp4 *.exe *.avi *.mkv *.mov *.wma *.wmv *.flv *.mpg *.divx *.wave *.m4a *.swf *.dov *.app *.bat *.com *.jar *.wsf *.iso *.dmg *.bin *.mdf *.bcd *.bak *.tmp1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2516
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
689B
MD5cbe07fa128cc33463cca9926ea3cd5cf
SHA122376f5b9cc408937418546e4005a7cc0f5dd8a7
SHA256a21fa4e242ecfdecfd30189504ea030045e054faec2aba32cf2eb87649c56f8f
SHA512b7f2f35f6710ab41cbb3f5ecc858371f1a6acb03139f97b8daf7f829391236283d2eb85c1cf376cd6ce5747e19f4676f8aca08cf6bdabe9763388400fe06b2de