Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 22:53
Static task
static1
Behavioral task
behavioral1
Sample
41948fe0f528fab753cc8a29d0b46487.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41948fe0f528fab753cc8a29d0b46487.exe
Resource
win10v2004-20231222-en
General
-
Target
41948fe0f528fab753cc8a29d0b46487.exe
-
Size
57KB
-
MD5
41948fe0f528fab753cc8a29d0b46487
-
SHA1
c11bb0daea4778a26c8e046adfac45f047ae6cfb
-
SHA256
7032940aa7b5cd68794fc930268119970bccd3c0e842333e957b87550da6f4bd
-
SHA512
7e04b89e32d98aa2a33442dde97dfa9f75487fe8ac7814d50cd81f5d6c0db5f71ac0d61d8cf606cad3508369553c28bcc409c648c3a5d96573727f83cfb31111
-
SSDEEP
768:eve/wBPqJwgLBBQARQkWV/7ru6riNFgH0hJW5KKa+m6+jXmX3KvZF36TdEgBBQAq:8GLBBQARc7lV5o36TdEgBBQARPE
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 41948fe0f528fab753cc8a29d0b46487.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\AE198AE1 = "{AE198AE1-9E3D-4BFF-89FC-75102E35FC2D}" 41948fe0f528fab753cc8a29d0b46487.exe -
Modifies AppInit DLL entries 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 41948fe0f528fab753cc8a29d0b46487.exe -
Loads dropped DLL 1 IoCs
pid Process 2200 41948fe0f528fab753cc8a29d0b46487.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\aehpoaeh.dll 41948fe0f528fab753cc8a29d0b46487.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 41948fe0f528fab753cc8a29d0b46487.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AE198AE1-9E3D-4BFF-89FC-75102E35FC2D} 41948fe0f528fab753cc8a29d0b46487.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AE198AE1-9E3D-4BFF-89FC-75102E35FC2D}\InProcServer32\ = "C:\\Windows\\SysWow64\\aehpoaeh.dll" 41948fe0f528fab753cc8a29d0b46487.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AE198AE1-9E3D-4BFF-89FC-75102E35FC2D}\InProcServer32\ThreadingModel = "Apartment" 41948fe0f528fab753cc8a29d0b46487.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AE198AE1-9E3D-4BFF-89FC-75102E35FC2D}\InProcServer32 41948fe0f528fab753cc8a29d0b46487.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 41948fe0f528fab753cc8a29d0b46487.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2200 41948fe0f528fab753cc8a29d0b46487.exe 2200 41948fe0f528fab753cc8a29d0b46487.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2200 41948fe0f528fab753cc8a29d0b46487.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2200 wrote to memory of 5044 2200 41948fe0f528fab753cc8a29d0b46487.exe 89 PID 2200 wrote to memory of 5044 2200 41948fe0f528fab753cc8a29d0b46487.exe 89 PID 2200 wrote to memory of 5044 2200 41948fe0f528fab753cc8a29d0b46487.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\41948fe0f528fab753cc8a29d0b46487.exe"C:\Users\Admin\AppData\Local\Temp\41948fe0f528fab753cc8a29d0b46487.exe"1⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SelfDel.bat" "2⤵PID:5044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
279B
MD5c59e7a74d76d1771dd27ae00604eb775
SHA1bdb0edcd89a84a36256402d9ea386b1fa7f61f4d
SHA256b0929ea46d01828f94338f12e5d957fefa58313005ab9241bc327ab39d911873
SHA5128e2fc342434efdcbfebb109031f04a01f3b391e13e8e274c3322dd22b81c2cb96581ceab24bcfa57564095a6c1e4f94c0601d5770e43d3afbfa318333b8200b6
-
Filesize
33KB
MD5f1cdcccfc4ce607981c43fb8cbaa81a4
SHA18387787fdc1aab4a1a49e62e1257624f89a1fe04
SHA2564b5d0d08e767d700cd9508493f72f3fa594d46baa1770801f5bf5d69002dc65f
SHA5120c00598552479c382c468aa54488cf4285ed983279936ba0f0a99fea1be4e0aeb9c89d3d7b15b7f2c416aa818945d7dd97fb8cdba62e48090bd06392aadbb9b1