Analysis
-
max time kernel
147s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24-12-2023 18:02
Behavioral task
behavioral1
Sample
0a3fbc500cc62d841596b09ca3c26a15.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a3fbc500cc62d841596b09ca3c26a15.exe
Resource
win10v2004-20231215-en
General
-
Target
0a3fbc500cc62d841596b09ca3c26a15.exe
-
Size
427KB
-
MD5
0a3fbc500cc62d841596b09ca3c26a15
-
SHA1
f833fbe67258de2b4a16daedce7374c05c7ef02a
-
SHA256
39d5eceac8e9401ee6f52340cafc3e7ffc7a3385a8cb5b86d830e9a40ad1e600
-
SHA512
2ebb93672215a288093e6a4159be0723dfcdba3789af461639f4507e45a82b243d8d0ca15f48b4da7b2bee5033288eb288c0782ee42dd10f83de5fe7012e8ff2
-
SSDEEP
12288:c8P9IOAJOOFJzdrkzlJcsWsHMYaKf5vNZx:rlSJOOFJzJUlJcsWsHLaK5N/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 0a3fbc500cc62d841596b09ca3c26a15.exe -
Executes dropped EXE 3 IoCs
pid Process 2592 craagle4.exe 4660 craagle4.exe 1728 craagle4.exe -
resource yara_rule behavioral2/memory/2364-0-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2364-1-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2364-2-0x0000000000400000-0x000000000043C000-memory.dmp upx behavioral2/memory/2364-20-0x0000000000400000-0x000000000043C000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2592 set thread context of 4660 2592 craagle4.exe 93 PID 4660 set thread context of 1728 4660 craagle4.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 4660 craagle4.exe 4660 craagle4.exe 1728 craagle4.exe 1728 craagle4.exe 1728 craagle4.exe 1728 craagle4.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2592 craagle4.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2592 2364 0a3fbc500cc62d841596b09ca3c26a15.exe 92 PID 2364 wrote to memory of 2592 2364 0a3fbc500cc62d841596b09ca3c26a15.exe 92 PID 2364 wrote to memory of 2592 2364 0a3fbc500cc62d841596b09ca3c26a15.exe 92 PID 2592 wrote to memory of 4660 2592 craagle4.exe 93 PID 2592 wrote to memory of 4660 2592 craagle4.exe 93 PID 2592 wrote to memory of 4660 2592 craagle4.exe 93 PID 2592 wrote to memory of 4660 2592 craagle4.exe 93 PID 2592 wrote to memory of 4660 2592 craagle4.exe 93 PID 2592 wrote to memory of 4660 2592 craagle4.exe 93 PID 2592 wrote to memory of 4660 2592 craagle4.exe 93 PID 2592 wrote to memory of 4660 2592 craagle4.exe 93 PID 2592 wrote to memory of 4660 2592 craagle4.exe 93 PID 4660 wrote to memory of 1728 4660 craagle4.exe 94 PID 4660 wrote to memory of 1728 4660 craagle4.exe 94 PID 4660 wrote to memory of 1728 4660 craagle4.exe 94 PID 4660 wrote to memory of 1728 4660 craagle4.exe 94 PID 4660 wrote to memory of 1728 4660 craagle4.exe 94 PID 4660 wrote to memory of 1728 4660 craagle4.exe 94 PID 1728 wrote to memory of 3268 1728 craagle4.exe 47 PID 1728 wrote to memory of 3268 1728 craagle4.exe 47 PID 1728 wrote to memory of 3268 1728 craagle4.exe 47 PID 1728 wrote to memory of 3268 1728 craagle4.exe 47
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3268
-
C:\Users\Admin\AppData\Local\Temp\0a3fbc500cc62d841596b09ca3c26a15.exe"C:\Users\Admin\AppData\Local\Temp\0a3fbc500cc62d841596b09ca3c26a15.exe"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\craagle4.exe"C:\Users\Admin\AppData\Local\Temp\craagle4.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\craagle4.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\craagle4.exeC:\Users\Admin\AppData\Local\Temp\craagle4.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1728
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
372KB
MD5bd7171acaa41c70629f4f1a166735333
SHA174327f1015e6a2a6b14a22a2bb77642cfb1c5dce
SHA256e84ce4e303692d0b243d61437c35c76af7aa95eefc637c4e6c49e6f71f7b0fa7
SHA5123a41071635581f90e1fd5ac30e2a6b401074de7ea8c954c96176d5e87b07e68ff0b07e6d50e4a9ee62bd1dd8a19b30eeb450ff792290d6b8ac7e9f4c6d8a7dc7
-
Filesize
353KB
MD56963fcda7a1503b519730e6180e8dec3
SHA188025d0fe7d6940265c6f34453d6b345d919be4e
SHA256a7a6bb729bfdc65f4ed98f35724148ed5f2ba3670f881335c462bcaddcfffa2e
SHA5126d9422d2dacdcf65c775bcfcf740d2316b97fee9140f68c76fefe6f9b961b632186d6a168de9cb6fbb2c095293e76d50c59b0c3a7540c3b793ef219fb1771421
-
Filesize
200KB
MD5bc048a66aba616542e1ebc4e29535d63
SHA1fa2deab5ae2c598b027df6c1c07a67cb5e6f3e16
SHA2568401652250ec1b26e0d5c828bca271669aae5d074b97c42e533d344842e6e535
SHA51296cbd7097dd4249fb5bce141c0a6c0e0338c778b092f921777fa67ac4c58ca36bcc706f35e98457f03c9cf7ca3f74a544f2ec14e2cc9c51093da0af7c1c67d37
-
Filesize
233KB
MD5956817ed472e73fc251dd714d5d1bc8d
SHA11ae55292b46c1fe889774ea9aee7572a3061014d
SHA2565d15c73a22d13a694f258f71fc466d7cf4b71fb8f44c5993465b180b053e8b78
SHA5122828f06d5d581920957879c19087a9365735604140a6f7c4fd3d6cad886adfb01e710fa018c584cdf1544244717686dea424d14c2272bdd5185764dd4ea1ac7e