Analysis
-
max time kernel
139s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 22:22
Static task
static1
Behavioral task
behavioral1
Sample
155eddde9edd18e1673f95febf4e9db8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
155eddde9edd18e1673f95febf4e9db8.exe
Resource
win10v2004-20231215-en
General
-
Target
155eddde9edd18e1673f95febf4e9db8.exe
-
Size
165KB
-
MD5
155eddde9edd18e1673f95febf4e9db8
-
SHA1
020a3bce09e03b061de37ffd2187a81e3553b547
-
SHA256
10f84706893f0ec21e07a943b2d397e0f1e9ab8ff45855c2facfdc8f90647a4c
-
SHA512
b3a150c107157928a31593237b807f21758c404af543c0e3d4eeba4ea7537d579504409a0494a50f7b39a49a885383448482a0e45b32db282d013ac8f8179424
-
SSDEEP
3072:a4HCWau/PlYeuL7ZLFh6Ca6cbL9l2hzB3fJCC6j8+Er6ez4:hiI/PlY37ZLF4Ca6WABqBOvs
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 155eddde9edd18e1673f95febf4e9db8.exe -
Executes dropped EXE 1 IoCs
pid Process 3460 ins6294.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini ins6294.exe File opened for modification C:\Windows\assembly\Desktop.ini ins6294.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly ins6294.exe File created C:\Windows\assembly\Desktop.ini ins6294.exe File opened for modification C:\Windows\assembly\Desktop.ini ins6294.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3460 ins6294.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3460 ins6294.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3460 ins6294.exe 3460 ins6294.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4804 wrote to memory of 3460 4804 155eddde9edd18e1673f95febf4e9db8.exe 23 PID 4804 wrote to memory of 3460 4804 155eddde9edd18e1673f95febf4e9db8.exe 23 PID 4804 wrote to memory of 3460 4804 155eddde9edd18e1673f95febf4e9db8.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\155eddde9edd18e1673f95febf4e9db8.exe"C:\Users\Admin\AppData\Local\Temp\155eddde9edd18e1673f95febf4e9db8.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\ins6294\ins6294.exe"C:\Users\Admin\AppData\Local\Temp\ins6294\ins6294.exe" ins.exe /t102bead80207efe2c1ad8b6414f0f5 /e10803481 /u24fcfd1d-162d-11e3-bc49-80c16e6f498c2⤵
- Executes dropped EXE
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3460
-