Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 13:57
Static task
static1
Behavioral task
behavioral1
Sample
b304933477e99ea3f4cc590444ba6ca8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
b304933477e99ea3f4cc590444ba6ca8.exe
Resource
win10v2004-20231215-en
General
-
Target
b304933477e99ea3f4cc590444ba6ca8.exe
-
Size
3.4MB
-
MD5
b304933477e99ea3f4cc590444ba6ca8
-
SHA1
7753ea9c326948dfb36a388875786cdae4d69da4
-
SHA256
3a60b4231d79734747159dee3fa46fc46fddeaad4bc43d2673ba2af18050845f
-
SHA512
63dbc484b082cba289bac9ee987826e45949b0dea618a97d0206088aa7a861b6f1cbf9ac3436b58dd9c352fbf497c4953fb9c7b9b565c09f1520c861560b560c
-
SSDEEP
98304:1/hkoj2oUU1W15I9Q/U/MQjuy8hTc1uG1uiC:1/PVs5IwVYUc1Wi
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 34 5084 cmd.exe 35 5084 cmd.exe 43 5084 cmd.exe 44 5084 cmd.exe 64 5084 cmd.exe 65 5084 cmd.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation b304933477e99ea3f4cc590444ba6ca8.exe Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation vHqlG02yYpHW8rS.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vHqlG02yYpHW8rS.exe b304933477e99ea3f4cc590444ba6ca8.exe -
Executes dropped EXE 2 IoCs
pid Process 2000 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 1412 vHqlG02yYpHW8rS.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe 5084 cmd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3972 wrote to memory of 3168 3972 b304933477e99ea3f4cc590444ba6ca8.exe 88 PID 3972 wrote to memory of 3168 3972 b304933477e99ea3f4cc590444ba6ca8.exe 88 PID 3972 wrote to memory of 3168 3972 b304933477e99ea3f4cc590444ba6ca8.exe 88 PID 3168 wrote to memory of 2000 3168 b304933477e99ea3f4cc590444ba6ca8.exe 94 PID 3168 wrote to memory of 2000 3168 b304933477e99ea3f4cc590444ba6ca8.exe 94 PID 3168 wrote to memory of 2000 3168 b304933477e99ea3f4cc590444ba6ca8.exe 94 PID 2000 wrote to memory of 1412 2000 vHqlG02yYpHW8rS.exe 95 PID 2000 wrote to memory of 1412 2000 vHqlG02yYpHW8rS.exe 95 PID 2000 wrote to memory of 1412 2000 vHqlG02yYpHW8rS.exe 95 PID 1412 wrote to memory of 5084 1412 vHqlG02yYpHW8rS.exe 96 PID 1412 wrote to memory of 5084 1412 vHqlG02yYpHW8rS.exe 96 PID 1412 wrote to memory of 5084 1412 vHqlG02yYpHW8rS.exe 96 PID 1412 wrote to memory of 5084 1412 vHqlG02yYpHW8rS.exe 96 PID 1412 wrote to memory of 5084 1412 vHqlG02yYpHW8rS.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\b304933477e99ea3f4cc590444ba6ca8.exe"C:\Users\Admin\AppData\Local\Temp\b304933477e99ea3f4cc590444ba6ca8.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\b304933477e99ea3f4cc590444ba6ca8.exe"C:\Users\Admin\AppData\Local\Temp\b304933477e99ea3f4cc590444ba6ca8.exe"2⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vHqlG02yYpHW8rS.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vHqlG02yYpHW8rS.exe" "C:\Users\Admin\AppData\Local\Temp\b304933477e99ea3f4cc590444ba6ca8.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vHqlG02yYpHW8rS.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\vHqlG02yYpHW8rS.exe" "C:\Users\Admin\AppData\Local\Temp\b304933477e99ea3f4cc590444ba6ca8.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:5084
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD5cf04b352df81c0cc3ec1e0fc14975e42
SHA1738219bea86c8d23b6e8ab1086778b19e5197510
SHA256882037fd9a19fe8c869c67343712fe991d90ad6020b4e5298bb4f7a84f4f5107
SHA5125ba1a4d7e5cd6da1e9c62d4afb5c37eed483e3a24a9e749c0906605e77233c75dea9e98821ea5f25e54d621344d8660f6a4624b206c990d9fad63479fc892c00
-
Filesize
1.2MB
MD5f4b717950ad7e5635f3f30a21d9dae5d
SHA1f198ea3a5c97ca6d86607a8c7ccd986e187ae208
SHA256b898a214609ec970d95ec21107f3f6e54921cb414c937a610663b94f0b9cfd45
SHA512456ee9c2425c84afd8a2037254f4e9f65162cf2bcd3dbd00da71c6ab177b8f7bf01993494b0d6bf65a1970a605d7c587cbf2ca7d7439e30661a149e07dc26341
-
Filesize
3.4MB
MD5aa5f263049a183e2fcfdee6b1b0fd8c8
SHA135704a5d1fa716eb5912b68dc31a7ea5a51ebd99
SHA256b6c37bbd370142adeebeec2a3e0c7797b460048252430f33716788730eeda014
SHA5124b781bd1d3a04c994a1f3102ac5b2edeba88e6d937021c6d5ec20273bdd4b3a5ada36edaffcff3b69a3b440aa84aa19c6de5d746055c9f8fc5ca2c8dc8ab6495
-
Filesize
1.5MB
MD5226e13b8a7d59b0d14c248bfb79afea9
SHA172e0772acdd2e8b029ac9971e2787179e4cd5ad8
SHA25618095ac657b5871f58a9732e09642a0c9be07e6ee9e63d1dfffe8b648d65266b
SHA512a03a1a33c94522be7e3889498cde9e5f2accbd1517fcf177149d7edaf7ee4f87fc91ae9296237e4007611d0eb294f83aec5f1b1a3a7aa5f426ddde9a54f9866c