Analysis
-
max time kernel
132s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 19:59
Static task
static1
Behavioral task
behavioral1
Sample
0f57198eb71f37f1ec8b5c3cc6446ffe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f57198eb71f37f1ec8b5c3cc6446ffe.exe
Resource
win10v2004-20231215-en
General
-
Target
0f57198eb71f37f1ec8b5c3cc6446ffe.exe
-
Size
789KB
-
MD5
0f57198eb71f37f1ec8b5c3cc6446ffe
-
SHA1
3419e30a6bad63e242e0e92a6caa3ff20c2ffdb7
-
SHA256
7f5ea56aa0866b82426719b62c668e880d628b655227f68ba08c4f755465caf2
-
SHA512
14318049bd8daa30df34a353f08c2d9475e8429f7689a39080e471306c51ede86b1237f0237b125ce5a6d350299b02073235f5802f944da1599274b65cba7b23
-
SSDEEP
12288:KtobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu44Rp:Kt8RHjEgYAw1hZlZTWQu7igcyKPEujf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation internal0f57198eb71f37f1ec8b5c3cc6446ffe.exe -
Executes dropped EXE 1 IoCs
pid Process 5024 internal0f57198eb71f37f1ec8b5c3cc6446ffe.exe -
Loads dropped DLL 1 IoCs
pid Process 3808 0f57198eb71f37f1ec8b5c3cc6446ffe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3004 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5024 internal0f57198eb71f37f1ec8b5c3cc6446ffe.exe 5024 internal0f57198eb71f37f1ec8b5c3cc6446ffe.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 5024 internal0f57198eb71f37f1ec8b5c3cc6446ffe.exe 5024 internal0f57198eb71f37f1ec8b5c3cc6446ffe.exe 5024 internal0f57198eb71f37f1ec8b5c3cc6446ffe.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3808 wrote to memory of 5024 3808 0f57198eb71f37f1ec8b5c3cc6446ffe.exe 89 PID 3808 wrote to memory of 5024 3808 0f57198eb71f37f1ec8b5c3cc6446ffe.exe 89 PID 3808 wrote to memory of 5024 3808 0f57198eb71f37f1ec8b5c3cc6446ffe.exe 89 PID 5024 wrote to memory of 1440 5024 internal0f57198eb71f37f1ec8b5c3cc6446ffe.exe 98 PID 5024 wrote to memory of 1440 5024 internal0f57198eb71f37f1ec8b5c3cc6446ffe.exe 98 PID 5024 wrote to memory of 1440 5024 internal0f57198eb71f37f1ec8b5c3cc6446ffe.exe 98 PID 1440 wrote to memory of 3004 1440 cmd.exe 100 PID 1440 wrote to memory of 3004 1440 cmd.exe 100 PID 1440 wrote to memory of 3004 1440 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f57198eb71f37f1ec8b5c3cc6446ffe.exe"C:\Users\Admin\AppData\Local\Temp\0f57198eb71f37f1ec8b5c3cc6446ffe.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\nsi4D86.tmp\internal0f57198eb71f37f1ec8b5c3cc6446ffe.exeC:\Users\Admin\AppData\Local\Temp\nsi4D86.tmp\internal0f57198eb71f37f1ec8b5c3cc6446ffe.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/0f57198eb71f37f1ec8b5c3cc6446ffe.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsi4D86.tmp/fallbackfiles/'2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\12063.bat" "C:\Users\Admin\AppData\Local\Temp\EDD6375C2FBF4C15AC1D427ED5F6C91A\""3⤵
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:3004
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD51579936646c066061053814066bda20f
SHA1e6add8113b58923d5a8ec8e011a42454fc1257db
SHA2561922ad57eb6941a52e445dccd02ded551cf425db82e6f77acb5cae9b5ac83b2b
SHA5128776f18ebb8a1e940a5937da5fe24a00caec6a2aad5fb83a5a38ffa8552fb5f00261ab4ba623be9889df6f23d500d19c6710444af42c8855884061e1fa372049
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\EDD6375C2FBF4C15AC1D427ED5F6C91A\EDD6375C2FBF4C15AC1D427ED5F6C91A_LogFile.txt
Filesize10KB
MD5e62321c1799a6547cfd9e124543ea020
SHA151f6291f20ca5ed34759041c896be12f02d6cc86
SHA256fe1d8d1896a5a508b64bd0311cc15d9603e10eeb857747799de561e9126a441d
SHA5126e76fdc5b05aee138944395e275ae715119984f1b02a95d45928a2320a47cc2c08313cab4249bfd45c6c96608a6e641f8057dbc93a6b641dea81c6d0a3673d44
-
Filesize
109KB
MD5404237edc79848f8e6ce310bdf4e18ff
SHA1c797d7b6e7d6b077ac9491b5f0b0c2a2bb8f36b0
SHA2567976691f25f991071851c34112a5e7031e4c7377e58f85b82ccc74b769214720
SHA512c21757af83dca95c474d15c8486c98c78ef9f5363b5d1ccb78ef4d5f56be973b0cdb98876bd68d55fa956f17a9941bf2ad0045ec4e1a45ce5f608c2681333e76
-
Filesize
14KB
MD521010df9bc37daffcc0b5ae190381d85
SHA1a8ba022aafc1233894db29e40e569dfc8b280eb9
SHA2560ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16
SHA51295d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e
-
Filesize
1.8MB
MD59ab5db4bb5971035b4d287d64f9676b5
SHA133d17f016339572dd05c124d6243fffefd0cd039
SHA256f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209
SHA512d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066
-
Filesize
17KB
MD5055c2cb77fa2edc2802b7fd397b9c213
SHA1e6bf5af3427539bf609cfb8904b35803a06104d3
SHA25678d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2
SHA5127dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65
-
Filesize
12KB
MD5fe272d040e82704707b19bfbf29d65ca
SHA1460de628ea63986a7e6390a1623d8ba32dc82aee
SHA2561cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983
SHA5128a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b