Analysis
-
max time kernel
144s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
1d4a924a3c08cc820a0dd0543a528d02.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1d4a924a3c08cc820a0dd0543a528d02.exe
Resource
win10v2004-20231222-en
General
-
Target
1d4a924a3c08cc820a0dd0543a528d02.exe
-
Size
40KB
-
MD5
1d4a924a3c08cc820a0dd0543a528d02
-
SHA1
05087a073ad9673ad88b173ff72be0c24db8c2bc
-
SHA256
e963c12bf3b1ee0edc47099a5dd88c2348c368719df71eba054d2f930840239d
-
SHA512
1ef310e2b251857d53dcc4830498aa6a47f95e7cf84cdcbfeb1ecd9aca464b3b8f672fcc23820ed0ed55a2b90bd4e6ededca3ee618ebcd6a0faeb6c2af421cd7
-
SSDEEP
384:0SBD9q934JbnoukusPW/6tusat4JEH1Vmu/pLTAlmQZzeT0pqfALXsKL+Nf:r9q93gbnoRus+/Sus47mv/cf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 1d4a924a3c08cc820a0dd0543a528d02.exe -
Executes dropped EXE 1 IoCs
pid Process 4556 winlogon.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\yuERDpKxAj = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\\\winlogon.exe\"" 1d4a924a3c08cc820a0dd0543a528d02.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4556 winlogon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2292 1d4a924a3c08cc820a0dd0543a528d02.exe 4556 winlogon.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2292 wrote to memory of 4556 2292 1d4a924a3c08cc820a0dd0543a528d02.exe 27 PID 2292 wrote to memory of 4556 2292 1d4a924a3c08cc820a0dd0543a528d02.exe 27 PID 2292 wrote to memory of 4556 2292 1d4a924a3c08cc820a0dd0543a528d02.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d4a924a3c08cc820a0dd0543a528d02.exe"C:\Users\Admin\AppData\Local\Temp\1d4a924a3c08cc820a0dd0543a528d02.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\winlogon.exe"C:\Users\Admin\AppData\Local\Temp\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
40KB
MD51d4a924a3c08cc820a0dd0543a528d02
SHA105087a073ad9673ad88b173ff72be0c24db8c2bc
SHA256e963c12bf3b1ee0edc47099a5dd88c2348c368719df71eba054d2f930840239d
SHA5121ef310e2b251857d53dcc4830498aa6a47f95e7cf84cdcbfeb1ecd9aca464b3b8f672fcc23820ed0ed55a2b90bd4e6ededca3ee618ebcd6a0faeb6c2af421cd7