Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 14:45
Behavioral task
behavioral1
Sample
01fe633effbb27f1ee20bdf39e2a4477.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01fe633effbb27f1ee20bdf39e2a4477.exe
Resource
win10v2004-20231222-en
General
-
Target
01fe633effbb27f1ee20bdf39e2a4477.exe
-
Size
12KB
-
MD5
01fe633effbb27f1ee20bdf39e2a4477
-
SHA1
80a4f907a5928b40481b1a53b1f09c8988ddc698
-
SHA256
3ffa785604ef7d3c995d884927a3cf3560f8c706ccf1320b195d5840557a391e
-
SHA512
d26b4c1094befea16a4b736f7974d4a0cfa524cb1336be84f3227e94662b17ed50b90412c3ecc9692b44410f023cfd6199dafae987e78294ceb6634ca5afeeb8
-
SSDEEP
192:nmzyHCZIVxZAIou5lxfQKyaNsqh44spRK52OG4dU5BCyiptmBKpKz:NHCZuxjo2SjksqW4sHK5FGuU/CyiHSGK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 01fe633effbb27f1ee20bdf39e2a4477.exe -
Executes dropped EXE 1 IoCs
pid Process 3940 setup.exe -
resource yara_rule behavioral2/memory/3492-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x000a00000002313f-5.dat upx behavioral2/memory/3492-9-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x000a00000002313f-8.dat upx behavioral2/memory/3940-10-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\logger = "\"C:\\windows\\setup.exe\"" setup.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created \??\c:\windows\setup.exe 01fe633effbb27f1ee20bdf39e2a4477.exe File opened for modification \??\c:\windows\setup.exe 01fe633effbb27f1ee20bdf39e2a4477.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3492 wrote to memory of 3940 3492 01fe633effbb27f1ee20bdf39e2a4477.exe 92 PID 3492 wrote to memory of 3940 3492 01fe633effbb27f1ee20bdf39e2a4477.exe 92 PID 3492 wrote to memory of 3940 3492 01fe633effbb27f1ee20bdf39e2a4477.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\01fe633effbb27f1ee20bdf39e2a4477.exe"C:\Users\Admin\AppData\Local\Temp\01fe633effbb27f1ee20bdf39e2a4477.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\windows\setup.exe"C:\windows\setup.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3940
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD501fe633effbb27f1ee20bdf39e2a4477
SHA180a4f907a5928b40481b1a53b1f09c8988ddc698
SHA2563ffa785604ef7d3c995d884927a3cf3560f8c706ccf1320b195d5840557a391e
SHA512d26b4c1094befea16a4b736f7974d4a0cfa524cb1336be84f3227e94662b17ed50b90412c3ecc9692b44410f023cfd6199dafae987e78294ceb6634ca5afeeb8