Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23/12/2023, 13:48
Behavioral task
behavioral1
Sample
371e49cc69f881f3ed599d5fa49db8386c72e614cde1d4058341af9065a607b1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
371e49cc69f881f3ed599d5fa49db8386c72e614cde1d4058341af9065a607b1.exe
Resource
win10v2004-20231222-en
General
-
Target
371e49cc69f881f3ed599d5fa49db8386c72e614cde1d4058341af9065a607b1.exe
-
Size
10.3MB
-
MD5
633c2ae82f4c553e1a2bae20aefdce01
-
SHA1
48a33fe05096b5ba35fcefd27053ae8ebf768257
-
SHA256
371e49cc69f881f3ed599d5fa49db8386c72e614cde1d4058341af9065a607b1
-
SHA512
d3cbb552bbfd34c0ced2fe28ceb1d5ddee6aca2d2a5e64413905aea180f1779bf2938f8fedff701ed0c1150e026efe10a70c368d0ab5557b4ad47b17d1a13e58
-
SSDEEP
196608:tb2VPOAM6oPZw24AhpDiLs2mIgEo5JYXTCsW2KOPfhEWbZYCY7yzHnJ5EkT8:x2VPOAM6oPZwXAhJwoLYXR8Wbg7YHJg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\International\Geo\Nation rundll32.exe -
resource yara_rule behavioral1/memory/1820-0-0x0000000000400000-0x0000000000EA7000-memory.dmp upx behavioral1/memory/1820-1-0x0000000000400000-0x0000000000EA7000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3818056530-936619650-3554021955-1000\Control Panel\International rundll32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1820 371e49cc69f881f3ed599d5fa49db8386c72e614cde1d4058341af9065a607b1.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2076 1820 371e49cc69f881f3ed599d5fa49db8386c72e614cde1d4058341af9065a607b1.exe 28 PID 1820 wrote to memory of 2076 1820 371e49cc69f881f3ed599d5fa49db8386c72e614cde1d4058341af9065a607b1.exe 28 PID 1820 wrote to memory of 2076 1820 371e49cc69f881f3ed599d5fa49db8386c72e614cde1d4058341af9065a607b1.exe 28 PID 1820 wrote to memory of 2076 1820 371e49cc69f881f3ed599d5fa49db8386c72e614cde1d4058341af9065a607b1.exe 28 PID 2076 wrote to memory of 1824 2076 control.exe 29 PID 2076 wrote to memory of 1824 2076 control.exe 29 PID 2076 wrote to memory of 1824 2076 control.exe 29 PID 2076 wrote to memory of 1824 2076 control.exe 29 PID 2076 wrote to memory of 1824 2076 control.exe 29 PID 2076 wrote to memory of 1824 2076 control.exe 29 PID 2076 wrote to memory of 1824 2076 control.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\371e49cc69f881f3ed599d5fa49db8386c72e614cde1d4058341af9065a607b1.exe"C:\Users\Admin\AppData\Local\Temp\371e49cc69f881f3ed599d5fa49db8386c72e614cde1d4058341af9065a607b1.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" intl.cpl,,12⤵
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL intl.cpl,,13⤵
- Checks computer location settings
- Modifies Control Panel
PID:1824
-
-