Analysis
-
max time kernel
0s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 03:31
Static task
static1
Behavioral task
behavioral1
Sample
033461e1a1e0afbb2de1e56488c4c816.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
033461e1a1e0afbb2de1e56488c4c816.exe
Resource
win10v2004-20231222-en
General
-
Target
033461e1a1e0afbb2de1e56488c4c816.exe
-
Size
26KB
-
MD5
033461e1a1e0afbb2de1e56488c4c816
-
SHA1
02977e132baee83024aeabdd9768765772508f3a
-
SHA256
73e5e04afae3801cbadde703045d1a4ad8c8c29c8120ee091bc226e58ccdb715
-
SHA512
293caeca03c8695ea169f16e6463b15cc41595b55dcafb68ad353f0e3f68569f3aa2a497bf8b9d05e232abcdfba6152a9195b62e9e97284bc89e0f5b672c7b02
-
SSDEEP
384:ximQrpRZPN37o04YBUqe4YJ0oJ2Pdo4E24JEv7ceAay3J:bQ1jV8LEUcgqvtAe/y3J
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 033461e1a1e0afbb2de1e56488c4c816.exe -
Executes dropped EXE 1 IoCs
pid Process 3868 mcsmss.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\cmssSystemProcess = "c:\\windows\\system32\\mcsmss.exe" 033461e1a1e0afbb2de1e56488c4c816.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\mcsmss.exe 033461e1a1e0afbb2de1e56488c4c816.exe File opened for modification \??\c:\windows\SysWOW64\mcsmss.exe 033461e1a1e0afbb2de1e56488c4c816.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe 4824 033461e1a1e0afbb2de1e56488c4c816.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4824 033461e1a1e0afbb2de1e56488c4c816.exe 3868 mcsmss.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4824 wrote to memory of 3868 4824 033461e1a1e0afbb2de1e56488c4c816.exe 24 PID 4824 wrote to memory of 3868 4824 033461e1a1e0afbb2de1e56488c4c816.exe 24 PID 4824 wrote to memory of 3868 4824 033461e1a1e0afbb2de1e56488c4c816.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\033461e1a1e0afbb2de1e56488c4c816.exe"C:\Users\Admin\AppData\Local\Temp\033461e1a1e0afbb2de1e56488c4c816.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\windows\SysWOW64\mcsmss.exe"C:\windows\system32\mcsmss.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD526ebf22bfdd5a2a04c89d89128bb9c68
SHA1c8968e79b52e2cab361a73ca570ae00d05a888e7
SHA25671a749896fd44f52256d63120a77f7b6b48fe43b53ce785fa447ad20253b7023
SHA512cb0dfe9ddf7e784621d2761f99cd1b6eabd3d0074cc3ac367a578c6e36125ea92dd617f7499b7f42b610078628c43ea392640b1f8cbbdc7b90b967fc5e1a32c4
-
Filesize
10KB
MD55ad08c3bb071dbe8f72034f6df918b82
SHA1c11795a5f33715ee3cbd4624314ca277094028c2
SHA2568b5bf03a3c77438a175325f95c6cbfa89c61768566e5456df612f5612e8316c8
SHA512bcd680e4bf59bafd5b6b25bf5d1cefc83a818d0f3fb32822e929bdda60982f2aefaf7269025e5242caf6437bf1963b81946952b525b3807b9391404e438deb3a