Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
13185ec9fea953d6da3b5bb8a1d618b1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13185ec9fea953d6da3b5bb8a1d618b1.exe
Resource
win10v2004-20231215-en
General
-
Target
13185ec9fea953d6da3b5bb8a1d618b1.exe
-
Size
17KB
-
MD5
13185ec9fea953d6da3b5bb8a1d618b1
-
SHA1
26b8f0b73694391aa2c5412c26d14e232066022a
-
SHA256
ca8eeba7a972c6bb759a7d08c116787693e3ae73ef858f207a8acae30f928bc1
-
SHA512
b23ef155c517bc75af32ad528fa3c6f4c9d8839a894d2409791e2bade99ba1bbdbbdf683b95cd4941d102623d34c4755b931f80a43325cda906a096f04eb1a41
-
SSDEEP
192:G8izYlpieycpo/zeoEMgr9aiI5SkT80PY8apbHQxoKQaN3l6CjzdVsQC/8:uz1lg65XT80PABHQebKl6CPkQC/8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 13185ec9fea953d6da3b5bb8a1d618b1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1336 13185ec9fea953d6da3b5bb8a1d618b1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1336 wrote to memory of 5828 1336 13185ec9fea953d6da3b5bb8a1d618b1.exe 93 PID 1336 wrote to memory of 5828 1336 13185ec9fea953d6da3b5bb8a1d618b1.exe 93 PID 1336 wrote to memory of 5828 1336 13185ec9fea953d6da3b5bb8a1d618b1.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\13185ec9fea953d6da3b5bb8a1d618b1.exe"C:\Users\Admin\AppData\Local\Temp\13185ec9fea953d6da3b5bb8a1d618b1.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\13185E~1.EXE > nul2⤵PID:5828
-