Analysis
-
max time kernel
223s -
max time network
240s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 23:40
Static task
static1
Behavioral task
behavioral1
Sample
1a4893fa4edaf7382fb5a35d96289669.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1a4893fa4edaf7382fb5a35d96289669.exe
Resource
win10v2004-20231215-en
General
-
Target
1a4893fa4edaf7382fb5a35d96289669.exe
-
Size
294KB
-
MD5
1a4893fa4edaf7382fb5a35d96289669
-
SHA1
87b4d4907372d903040bb13a569246088f4bf3dc
-
SHA256
ba0b9c1a7b6328e56d9fd1ae303491ef2101e20d841515d0350847c6a9811e51
-
SHA512
9948dd9cf8c82dd6b6c6a12f2ef8f59cb69d2799e73cf57d49ac5a9ed6e56a21478273e66c9bce7f605341dba056a77a3e2d205f3756bbc9f96f220ca4795439
-
SSDEEP
6144:kG8UEd8BKBLpr3Cm6PfED3qzdo1kaeaQMndLcNpf4:kG8UEdDTCNEzqzaBndI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 1512 znGFD28.exe -
Loads dropped DLL 1 IoCs
pid Process 1512 znGFD28.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MSSMSGS = "rundll32.exe winjfp32.rom,gpyPYOU" znGFD28.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\winjfp32.rom znGFD28.exe File opened for modification C:\Windows\SysWOW64\winjfp32.rom znGFD28.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 444 1968 WerFault.exe 85 -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31078330" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{FAFC149B-A3AD-11EE-B7F4-76CF25FE979C} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "3706889908" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "3671262522" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31078330" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\MINIE iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\MINIE\TabBandWidth = "500" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Software\Microsoft\Internet Explorer\Recovery\PendingDelete iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingDelete\C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{0397123F-A3AE-11EE-B7F4-76CF25FE979C}.dat = "0" iexplore.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4716 iexplore.exe 4716 iexplore.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1968 wrote to memory of 1512 1968 1a4893fa4edaf7382fb5a35d96289669.exe 91 PID 1968 wrote to memory of 1512 1968 1a4893fa4edaf7382fb5a35d96289669.exe 91 PID 1968 wrote to memory of 1512 1968 1a4893fa4edaf7382fb5a35d96289669.exe 91 PID 1512 wrote to memory of 1344 1512 znGFD28.exe 92 PID 1512 wrote to memory of 1344 1512 znGFD28.exe 92 PID 1512 wrote to memory of 1344 1512 znGFD28.exe 92 PID 1344 wrote to memory of 4716 1344 cmd.exe 94 PID 1344 wrote to memory of 4716 1344 cmd.exe 94 PID 1512 wrote to memory of 5056 1512 znGFD28.exe 98 PID 1512 wrote to memory of 5056 1512 znGFD28.exe 98 PID 1512 wrote to memory of 5056 1512 znGFD28.exe 98 PID 1512 wrote to memory of 3616 1512 znGFD28.exe 97 PID 1512 wrote to memory of 3616 1512 znGFD28.exe 97 PID 1512 wrote to memory of 3616 1512 znGFD28.exe 97 PID 4716 wrote to memory of 4556 4716 iexplore.exe 103 PID 4716 wrote to memory of 4556 4716 iexplore.exe 103 PID 4716 wrote to memory of 4556 4716 iexplore.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a4893fa4edaf7382fb5a35d96289669.exe"C:\Users\Admin\AppData\Local\Temp\1a4893fa4edaf7382fb5a35d96289669.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\znGFD28.exeC:\Users\Admin\AppData\Local\Temp\znGFD28.exe NkaYqchnnDdwJmFyz02⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\cmd.execmd /c start iexplore -embedding3⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" -embedding4⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4716 CREDAT:17410 /prefetch:25⤵PID:4556
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\znGFD28.bat"3⤵PID:3616
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\hWAFE70.bat"3⤵PID:5056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1968 -s 3082⤵
- Program crash
PID:444
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1968 -ip 19681⤵PID:4780
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188B
MD5b6aca5057efbc433d0e6638d1fb8877e
SHA15fac84c42dedcb6fae15ad00856cff6f25960d37
SHA256321dac7b21d63ccae99e4aaf443cebda5250dc91c18c39d0989865f5a3eb613a
SHA512a4a9dcaaa5d32c6f95a7dc3cc1598702c9970249701526159ce77c9534bd1b500621bf0653859dc694206404cfaeba7f53e047f7a36f260fa9cb2697b04cb97e
-
Filesize
106KB
MD53d5b47074f91141df959bff5f09d26fb
SHA1c9ee992eaceacb15daaf99745fae7c12ec2a907d
SHA25646928ae33391f8ca8fc269febcf5ddd2b15ee0cf463c2828b178d0a713a117c6
SHA51248832fad97fd561d89f2be86f16a8a7b797d9d55a266912c4d5422eaa12eb058757e5ec175430570fcebcc2a6525fff29a36f15c211c6c4d9f1e519cfa5fbcbe
-
Filesize
188B
MD51a74be72c926b37150c17aea18f4d04c
SHA1bc369e7f0891fd4dc57427b858668123cab13950
SHA2561590e09e9f39fbf60e51a8dcd6a9522118544a234016097d88190beb0a0ef928
SHA512ddbcec2d627cbc35329bef06128832aa5eddfe362fad5bc07d83303bd21f650eb4ae9db535373a6aa48314774189c4adae88d321e3e022081ccc89356f69a56f
-
Filesize
231KB
MD5af87658d30c2166a1949759cfdec0386
SHA1b2d112f6f9728b3e2318ae08eadc61373884c30a
SHA2563d9c6ffe9eb7e842b0fad5063db7e886cb794301d3268b7ee3b840b6d01b3c20
SHA512cd2eaaacf54a5a6b6300d7119f7dbff0b000b7ddcf6af4ef0450df816c1352ae95da459b6f3a422d82d0930765fd984efd19ec63de799b451e123e5ab5dea9d9