Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 21:52
Static task
static1
Behavioral task
behavioral1
Sample
13e794bd094779cebd455a03ca744ed6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13e794bd094779cebd455a03ca744ed6.exe
Resource
win10v2004-20231215-en
General
-
Target
13e794bd094779cebd455a03ca744ed6.exe
-
Size
1.9MB
-
MD5
13e794bd094779cebd455a03ca744ed6
-
SHA1
84cbee14c5e4f7a9a5cde993c737d7dcb294be27
-
SHA256
71fa7d93cfb8dc84d792906e9b547dff02b8dccaf8a90f3f63f56f3fe058f809
-
SHA512
ebef1f18d0e9a4d2c3717b96facd5f787621afc2895bc425ece55a2defe34af1e100328b31b094a566faf9987f32fbbf28332f7e8a76688d4cefbe9b2417afba
-
SSDEEP
24576:NZAjphUYz2zEi5ZoFRw9hQtrda7mg3ksJ4vAzs58pxAW0BMfQ+3arWuvzzIny:XkjpFvwgwo+3arWNny
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 13e794bd094779cebd455a03ca744ed6.exe -
Executes dropped EXE 3 IoCs
pid Process 3352 ~DP49EA.exe 696 ~DP4AD5.exe 1272 winlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nvchost = "C:\\Users\\Admin\\AppData\\Local\\Temp\\~DP49EA.exe" ~DP49EA.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nvchost = "C:\\Windows\\winlogon.exe" winlogon.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\winlogon.exe ~DP49EA.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1272 winlogon.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3888 wrote to memory of 3352 3888 13e794bd094779cebd455a03ca744ed6.exe 21 PID 3888 wrote to memory of 3352 3888 13e794bd094779cebd455a03ca744ed6.exe 21 PID 3888 wrote to memory of 3352 3888 13e794bd094779cebd455a03ca744ed6.exe 21 PID 3888 wrote to memory of 696 3888 13e794bd094779cebd455a03ca744ed6.exe 20 PID 3888 wrote to memory of 696 3888 13e794bd094779cebd455a03ca744ed6.exe 20 PID 3888 wrote to memory of 696 3888 13e794bd094779cebd455a03ca744ed6.exe 20 PID 3352 wrote to memory of 1272 3352 ~DP49EA.exe 40 PID 3352 wrote to memory of 1272 3352 ~DP49EA.exe 40 PID 3352 wrote to memory of 1272 3352 ~DP49EA.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\13e794bd094779cebd455a03ca744ed6.exe"C:\Users\Admin\AppData\Local\Temp\13e794bd094779cebd455a03ca744ed6.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\~DP4AD5.exe"C:\Users\Admin\AppData\Local\Temp\~DP4AD5.exe"2⤵
- Executes dropped EXE
PID:696
-
-
C:\Users\Admin\AppData\Local\Temp\~DP49EA.exe"C:\Users\Admin\AppData\Local\Temp\~DP49EA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\winlogon.exeC:\Windows\winlogon.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:1272
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD543594029a876dc14c57660916c1959ba
SHA1d7b951a1d89093a43a7d1b671fa430f0f4520cbe
SHA2564e60272d0dc5ebe6ac562b7b6884eae2c7fc68ea6f7224436bf96cff39b2de4e
SHA512252d69e41345ca276ae08f79b34e14b22a07cfbbcfcf8ef255751b3ff347347aa1a8d7fcb8ab1a54ec2d726e865b051531ce141beba99f6a75da7e9875045635
-
Filesize
156KB
MD5b6d86545f6d07c059edfcfbf6e7e2bb1
SHA17783341895cc24d1e29a9a0f12bf0c8551a4d790
SHA25685fa635c3b491e8fdd69eec199dd99cfe1f0a8309b21d0ff528b8ab172062cf1
SHA5120406daf1f7f1e0bd74b27aae5a13095af43da91c7c827b367059c456dd8d6c30f27604abd4c8dcbc1164706ecbef47b73eb9f2bd0708ad4035957535636cf9ce
-
Filesize
96KB
MD50ea8cb733d77a226513eab550a1c48af
SHA12375692bcaf10babb427ab840d312e26bd4f5286
SHA25609ffcbf7bf6ec9d9ba598e8827f01ce34dd942da3280bf06c65b512277e3b019
SHA5127feb4a42c8b20c49e6b013d720b0479f3466d6a17d994b1e91ba2b6d118f70aa74121a54a137634976e44ab110af3355284cb04e0e13a06776f5b564e8499816
-
Filesize
93KB
MD5990f76250eb7c44272018cbf57fa714c
SHA11d3cc97e30967003d03273b9f5908b15700af504
SHA2560545a5ee497e8de5eaa080fa7282cb3627d370de1abe003cac767377d7ba0a7a
SHA51290a94248d63e88e99a8cbd13188b0d332c182d9cf7fe56215276f79079c2bcc07b6b6e334b5475e560dfc399b4eeb83b088d2d791beaab424146fb0711e6e52e