Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 07:59
Static task
static1
Behavioral task
behavioral1
Sample
1094b89a4c6b041249eed29570daac04.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1094b89a4c6b041249eed29570daac04.exe
Resource
win10v2004-20231222-en
General
-
Target
1094b89a4c6b041249eed29570daac04.exe
-
Size
1.3MB
-
MD5
1094b89a4c6b041249eed29570daac04
-
SHA1
dee227a62dc7521f46f37eaca8a0d33513e102bc
-
SHA256
cf3265ddd8a7c75fe5a40ec8f57185175c413b074bdf3cb654fe8e65198e26b8
-
SHA512
28c9ab5e5bf3a312cbf1d588fe719ff080a626a8c079a8eed8abdf687521ee02b5a3199b7a034408d9c8e7b143700245db9223cdd3637a901e60467f8da4d985
-
SSDEEP
24576:abGAEhADYqbFR9A7aCIwYJTRCc33q73vk/Zs8zJNCmHUPxlqFPB7A9g1N:8Eh8bjUc33q7/eZXUPqPBc0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 1094b89a4c6b041249eed29570daac04.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation tmp.tmp.tmp1 -
Executes dropped EXE 2 IoCs
pid Process 4436 Monobole.EXE 3504 tmp.tmp.tmp1 -
resource yara_rule behavioral2/memory/3504-20-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral2/files/0x000700000002320e-18.dat upx behavioral2/memory/3504-22-0x0000000000400000-0x000000000046D000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\SMSSS.bat tmp.tmp.tmp1 File opened for modification C:\Windows\SysWOW64\SMSSS.bat tmp.tmp.tmp1 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Monobole.EXE 1094b89a4c6b041249eed29570daac04.exe File opened for modification C:\Windows\tmp.tmp.tmp1 1094b89a4c6b041249eed29570daac04.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 3568 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3568 AUDIODG.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4444 1094b89a4c6b041249eed29570daac04.exe 3504 tmp.tmp.tmp1 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4444 wrote to memory of 4436 4444 1094b89a4c6b041249eed29570daac04.exe 92 PID 4444 wrote to memory of 4436 4444 1094b89a4c6b041249eed29570daac04.exe 92 PID 4444 wrote to memory of 4436 4444 1094b89a4c6b041249eed29570daac04.exe 92 PID 4444 wrote to memory of 3504 4444 1094b89a4c6b041249eed29570daac04.exe 93 PID 4444 wrote to memory of 3504 4444 1094b89a4c6b041249eed29570daac04.exe 93 PID 4444 wrote to memory of 3504 4444 1094b89a4c6b041249eed29570daac04.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1094b89a4c6b041249eed29570daac04.exe"C:\Users\Admin\AppData\Local\Temp\1094b89a4c6b041249eed29570daac04.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\Monobole.EXE"C:\Windows\Monobole.EXE"2⤵
- Executes dropped EXE
PID:4436
-
-
C:\Windows\tmp.tmp.tmp1C:\Windows\tmp.tmp.tmp12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:3504
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x50c 0x5141⤵
- Suspicious use of AdjustPrivilegeToken
PID:3568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
672KB
MD59cf74972fcd30f2741ed8268427b319c
SHA15b2857be725b42df6abfafad462eec302ea6f068
SHA256a2fb825d02667b92786d6afb83d9ff0c109bfad5610e56d83686cf472af88f13
SHA5122b20646b764ef6a5b04deebe1a7f670a339dcdb00b76165963327dc868b6948cd55ae15e979f775ef1bfe92cdbcfeb1fafe5ae6a9bbae0c171a11b7ae8c86822
-
Filesize
939KB
MD5a833ee9bd065b5623cf88359ac6b6196
SHA12ce155eace5843df6f641d49227335e7cf8f105a
SHA256db9bdae2e04fbfc6b64ae4a0cfa7da3f799a4861e7a3293bf5843e32533a1991
SHA512531b2f5447c75cd025952b7ad6edf757b2d1adc0bdcbca5131cf4062bc2b24bd41103d0597422adce9717a7835b2e66b45734bc735f63a54a5ffba6ee45cd90f
-
Filesize
1.1MB
MD5b5c8315431bf8351bb77424f15fdc359
SHA17add6c995e1925f6fb4bf1fc5c07b8043cc71c61
SHA25666a366391c212badb0ab16ef991b79359b044759abbfb598d43962231ec49236
SHA51287419323a17615a47666ed22d96131e13d5e8a7a9dad3271aa106f65806e8708218dbfe51e275f965ba5d05bec07057650f3d5332817f06657d53ea4e6f3c6ab
-
Filesize
101KB
MD5afd3ad021ddab1cad2cfbafe0379e699
SHA13cc8a82ed9beb093e3d0614ae22c6a441812897b
SHA256bc11112c374a0197cbfa2fdf826398e39d82b8fe00de160cce78a76689cd4d3c
SHA5128827d631beb29bf005b45750af90a26ffd1836e186758beeb628134598904e5837633ca1c37bf7d6fc957725b25410f8ee55435134a0833714be3c5a0352241a