Analysis
-
max time kernel
170s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
20b5c5f38ba7289d2468864a58c81154.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20b5c5f38ba7289d2468864a58c81154.exe
Resource
win10v2004-20231215-en
General
-
Target
20b5c5f38ba7289d2468864a58c81154.exe
-
Size
11KB
-
MD5
20b5c5f38ba7289d2468864a58c81154
-
SHA1
af0461e19ca7122693c2691e54413cf31b29197f
-
SHA256
79fac7732f9cf7b9b85cccadc7cae671e089b1b608482f47e550e00ee997d371
-
SHA512
7913b4eb2ab1859cf835028a51c6cd1b39056f8f32f1aeb19c3bd628aa4a14b3ac82824a095aeac03968b13b540447d4bbfae7cb0eaa06cea1cb7511bd575fa7
-
SSDEEP
192:L3beAGcSzhErNuluNtnv8JmoibeDknydNysxLVxkD4tuL:LDPrNuluNtnv8sbeQydc4xbuL
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 20b5c5f38ba7289d2468864a58c81154.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1588 20b5c5f38ba7289d2468864a58c81154.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1588 wrote to memory of 3652 1588 20b5c5f38ba7289d2468864a58c81154.exe 91 PID 1588 wrote to memory of 3652 1588 20b5c5f38ba7289d2468864a58c81154.exe 91 PID 1588 wrote to memory of 3652 1588 20b5c5f38ba7289d2468864a58c81154.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\20b5c5f38ba7289d2468864a58c81154.exe"C:\Users\Admin\AppData\Local\Temp\20b5c5f38ba7289d2468864a58c81154.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\20B5C5~1.EXE > nul2⤵PID:3652
-