Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 08:09
Static task
static1
Behavioral task
behavioral1
Sample
111a8f4dca3c4f9e23c72d10cce1a072.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
111a8f4dca3c4f9e23c72d10cce1a072.exe
Resource
win10v2004-20231222-en
General
-
Target
111a8f4dca3c4f9e23c72d10cce1a072.exe
-
Size
37KB
-
MD5
111a8f4dca3c4f9e23c72d10cce1a072
-
SHA1
e9d0c1c19f5d2aa59b04fbfdc220dff428e450f7
-
SHA256
1b46dd2363eaf3bb5430e4d0e9c3d0db0a3d0db4dcf1962270bfa7a768f74d0c
-
SHA512
7099a2ba2d7b53f22801e1c3fd66b71e14c9025a86da5d9004a19feff7b32d582de997f2efa93b11f14bd7231e343ba336ee3abde7151cbb944a606450db842a
-
SSDEEP
768:28kr2D6AKlLO+SNhBgCHDck4MV0ggv8KoETBB9D3xvjHhx4eC7Xj8Qc1ey:5/6A0q5HDR4oWBx3xrBx41z8Qcky
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 111a8f4dca3c4f9e23c72d10cce1a072.exe -
Executes dropped EXE 1 IoCs
pid Process 2224 xwizard.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\ProgramData\Microsoft\v2.0_2.0.0.0__6ceeff94d364c681\xwizard.exe:Zone.Identifier 111a8f4dca3c4f9e23c72d10cce1a072.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2528 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe 2224 xwizard.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4076 wrote to memory of 4120 4076 111a8f4dca3c4f9e23c72d10cce1a072.exe 94 PID 4076 wrote to memory of 4120 4076 111a8f4dca3c4f9e23c72d10cce1a072.exe 94 PID 4076 wrote to memory of 4120 4076 111a8f4dca3c4f9e23c72d10cce1a072.exe 94 PID 4120 wrote to memory of 2528 4120 cmd.exe 96 PID 4120 wrote to memory of 2528 4120 cmd.exe 96 PID 4120 wrote to memory of 2528 4120 cmd.exe 96 PID 4120 wrote to memory of 2376 4120 cmd.exe 97 PID 4120 wrote to memory of 2376 4120 cmd.exe 97 PID 4120 wrote to memory of 2376 4120 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\111a8f4dca3c4f9e23c72d10cce1a072.exe"C:\Users\Admin\AppData\Local\Temp\111a8f4dca3c4f9e23c72d10cce1a072.exe"1⤵
- Checks computer location settings
- NTFS ADS
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /d /c ping -n 2 127.0.0.1 > NUL & fsutil file setzerodata offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\111a8f4dca3c4f9e23c72d10cce1a072.exe" & del "C:\Users\Admin\AppData\Local\Temp\111a8f4dca3c4f9e23c72d10cce1a072.exe" > NUL & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\PING.EXEping -n 2 127.0.0.13⤵
- Runs ping.exe
PID:2528
-
-
C:\Windows\SysWOW64\fsutil.exefsutil file setzerodata offset=0 length=524288 "C:\Users\Admin\AppData\Local\Temp\111a8f4dca3c4f9e23c72d10cce1a072.exe"3⤵PID:2376
-
-
-
C:\ProgramData\Microsoft\v2.0_2.0.0.0__6ceeff94d364c681\xwizard.exeC:\ProgramData\Microsoft\v2.0_2.0.0.0__6ceeff94d364c681\xwizard.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2224
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD5111a8f4dca3c4f9e23c72d10cce1a072
SHA1e9d0c1c19f5d2aa59b04fbfdc220dff428e450f7
SHA2561b46dd2363eaf3bb5430e4d0e9c3d0db0a3d0db4dcf1962270bfa7a768f74d0c
SHA5127099a2ba2d7b53f22801e1c3fd66b71e14c9025a86da5d9004a19feff7b32d582de997f2efa93b11f14bd7231e343ba336ee3abde7151cbb944a606450db842a