Analysis
-
max time kernel
148s -
max time network
167s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 16:29
Static task
static1
Behavioral task
behavioral1
Sample
05c994a4691f53fab4bbe643c8512a42.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05c994a4691f53fab4bbe643c8512a42.exe
Resource
win10v2004-20231215-en
General
-
Target
05c994a4691f53fab4bbe643c8512a42.exe
-
Size
367KB
-
MD5
05c994a4691f53fab4bbe643c8512a42
-
SHA1
4d04f345f34cf80b419bd28c7c3600fb4edc644a
-
SHA256
d860ba73b49187ad139485cd7a582f7d1f37693ca06cbb3cb91581ed8821a71f
-
SHA512
28755934c2351ac8316020d5d78868425e6bfe93034929b412dce5b08f616b3b4920607fbdef83196699f69e23be52e1393d6902cefa3336db68cfdc38ab4c3d
-
SSDEEP
6144:iO/N4yidWNLbii5bkgVuN+xSKV7Wkrsf7LsQH8frtCj6SVOwICNt:iOVedQXikbkgaISKVy8A6SVp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 05c994a4691f53fab4bbe643c8512a42.exe -
Executes dropped EXE 1 IoCs
pid Process 3748 62F0DE83-45A3-44DB-9697-4A140AC85636.exe -
Loads dropped DLL 1 IoCs
pid Process 4752 05c994a4691f53fab4bbe643c8512a42.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4752 wrote to memory of 3748 4752 05c994a4691f53fab4bbe643c8512a42.exe 92 PID 4752 wrote to memory of 3748 4752 05c994a4691f53fab4bbe643c8512a42.exe 92 PID 4752 wrote to memory of 3748 4752 05c994a4691f53fab4bbe643c8512a42.exe 92 PID 4752 wrote to memory of 4312 4752 05c994a4691f53fab4bbe643c8512a42.exe 94 PID 4752 wrote to memory of 4312 4752 05c994a4691f53fab4bbe643c8512a42.exe 94 PID 4752 wrote to memory of 4312 4752 05c994a4691f53fab4bbe643c8512a42.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\05c994a4691f53fab4bbe643c8512a42.exe"C:\Users\Admin\AppData\Local\Temp\05c994a4691f53fab4bbe643c8512a42.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\11dde42e-fec8-4569-b70a-ac14e18b37a4\62F0DE83-45A3-44DB-9697-4A140AC85636.exe"C:\11dde42e-fec8-4569-b70a-ac14e18b37a4\62F0DE83-45A3-44DB-9697-4A140AC85636.exe" -y -p8FEF45FA-F2B3-40D5-B6AB-8B0A80D765212⤵
- Executes dropped EXE
PID:3748
-
-
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" c:\11dde42e-fec8-4569-b70a-ac14e18b37a4\start.hta2⤵PID:4312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5fa99d30e757956d6d8bf6db9005ee081
SHA141b5a5f11ff3d7691ca261971e7336faf1d1a1f9
SHA256b6a51af80991b7a1acdaa6cfd7f3bb55057b6884e68e0374c62826de64dd5c83
SHA512e215c16828eb35e62cc4956cf8b6631c10bfcd435b7eff33366a969a32f029d787b394e62c970d14f10184a7754fc33f22e0641fcebf3ac05449836620939a9a
-
Filesize
132KB
MD5c6bb5c8c284dca85783c63b72bcfd320
SHA1bddb5f3b7cae522d3a35a677b2181c3a2d5c3689
SHA256690e586d7c0ed8c49b44dd42580a9451a02b3b25db22b200b81a803ef847d666
SHA512c79c1cabdb5bc0f1070dfcde2b4182e9092be1719e140f1cf510bd19ffb2f08945f60ca4dfdeb2f83b443ffa4a3431304ea56f288bb11c233bcf72dd3ccf8f60
-
Filesize
1KB
MD5e88ebd85dd56110ac6ea93fe0922988e
SHA1684a31d864d33ff736234c41ac4e8d2c7f90d5ae
SHA256379d1b0948f8e06366e7bcd197c848c0cc783787792f2224f98c16b974d920eb
SHA512211b0760c9a887fc13c479617daeb6d5b6ee0ccd06c214967abd3e1f14204f72e34a6dd5eb778a9fc6ac7fc8bd63bdef80b347abab97becda16924cb3e164dc7
-
Filesize
1KB
MD5db4ada697fa7a0e215281533d52578e9
SHA1fb755ea8371edf5065dc53e21eb413603f9eba7f
SHA256f949fd6ca734830572128b4348dfd039419140c7ef501d80773f71ca3f0ed78c
SHA5129ba1d2658785dd3c88b4399132f8330dc58872235e19ca9854b0e453d8cc7a58de0c8be84da376a72b5851073f531c95b2c6afa84f43053561ca8e6751d6e2f3