Analysis
-
max time kernel
120s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:24
Static task
static1
Behavioral task
behavioral1
Sample
16f7a0a349b11398ed2c8b0c1e84a715.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16f7a0a349b11398ed2c8b0c1e84a715.exe
Resource
win10v2004-20231215-en
General
-
Target
16f7a0a349b11398ed2c8b0c1e84a715.exe
-
Size
42KB
-
MD5
16f7a0a349b11398ed2c8b0c1e84a715
-
SHA1
4f8af77baa7c8ab008925a1494a5a034eb3bceef
-
SHA256
75e391b7f22fa2b6379af5c9b4e6588370ddbf4b2f1e3bce6bc6d31c446b084f
-
SHA512
72714f47663b8eb15f19f240c4c1625deb5fdb987e2e36056de307a34365aaa6f545280d8c2ecb9a78c01c0e8cc2c7a1b69019cde59c7cfd157ea09ebf963854
-
SSDEEP
768:rppWsMo8MeEDVWkcQjfiLzP674J52B7X07OJbzdXoiPgtPErj6o1lcKe:rruoMLiaLzY4J247ONdfgw6qlj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 16f7a0a349b11398ed2c8b0c1e84a715.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation osmkhtmy.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation osmkhtmy.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation osmkhtmy.exe -
Deletes itself 1 IoCs
pid Process 912 osmkhtmy.exe -
Executes dropped EXE 3 IoCs
pid Process 912 osmkhtmy.exe 4148 osmkhtmy.exe 5056 osmkhtmy.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\osmkhtmy.exe 16f7a0a349b11398ed2c8b0c1e84a715.exe File opened for modification \??\c:\windows\SysWOW64\osmkhtmy.exe 16f7a0a349b11398ed2c8b0c1e84a715.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 16f7a0a349b11398ed2c8b0c1e84a715.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 16f7a0a349b11398ed2c8b0c1e84a715.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000000-0000-0000-0000-000000000001} 16f7a0a349b11398ed2c8b0c1e84a715.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000000-0000-0000-0000-000000000001}\InprocServer32 osmkhtmy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000000-0000-0000-0000-000000000001}\InprocServer32 osmkhtmy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000000-0000-0000-0000-000000000001}\InprocServer32 osmkhtmy.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000000-0000-0000-0000-000000000001}\InprocServer32 16f7a0a349b11398ed2c8b0c1e84a715.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4756 wrote to memory of 2476 4756 16f7a0a349b11398ed2c8b0c1e84a715.exe 89 PID 4756 wrote to memory of 2476 4756 16f7a0a349b11398ed2c8b0c1e84a715.exe 89 PID 4756 wrote to memory of 2476 4756 16f7a0a349b11398ed2c8b0c1e84a715.exe 89 PID 4756 wrote to memory of 912 4756 16f7a0a349b11398ed2c8b0c1e84a715.exe 90 PID 4756 wrote to memory of 912 4756 16f7a0a349b11398ed2c8b0c1e84a715.exe 90 PID 4756 wrote to memory of 912 4756 16f7a0a349b11398ed2c8b0c1e84a715.exe 90 PID 912 wrote to memory of 1096 912 osmkhtmy.exe 91 PID 912 wrote to memory of 1096 912 osmkhtmy.exe 91 PID 912 wrote to memory of 1096 912 osmkhtmy.exe 91 PID 912 wrote to memory of 4148 912 osmkhtmy.exe 92 PID 912 wrote to memory of 4148 912 osmkhtmy.exe 92 PID 912 wrote to memory of 4148 912 osmkhtmy.exe 92 PID 4148 wrote to memory of 3776 4148 osmkhtmy.exe 93 PID 4148 wrote to memory of 3776 4148 osmkhtmy.exe 93 PID 4148 wrote to memory of 3776 4148 osmkhtmy.exe 93 PID 4148 wrote to memory of 5056 4148 osmkhtmy.exe 106 PID 4148 wrote to memory of 5056 4148 osmkhtmy.exe 106 PID 4148 wrote to memory of 5056 4148 osmkhtmy.exe 106 PID 5056 wrote to memory of 4732 5056 osmkhtmy.exe 107 PID 5056 wrote to memory of 4732 5056 osmkhtmy.exe 107 PID 5056 wrote to memory of 4732 5056 osmkhtmy.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\16f7a0a349b11398ed2c8b0c1e84a715.exe"C:\Users\Admin\AppData\Local\Temp\16f7a0a349b11398ed2c8b0c1e84a715.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s2⤵PID:2476
-
-
C:\windows\SysWOW64\osmkhtmy.exe"C:\windows\system32\osmkhtmy.exe" -kill c:\users\admin\appdata\local\temp\16f7a0a349b11398ed2c8b0c1e84a715.exe /install2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s3⤵PID:1096
-
-
C:\windows\SysWOW64\osmkhtmy.exe"C:\windows\system32\osmkhtmy.exe" -kill c:\windows\syswow64\osmkhtmy.exe /install /install3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s4⤵PID:3776
-
-
C:\windows\SysWOW64\osmkhtmy.exe"C:\windows\system32\osmkhtmy.exe" -kill c:\windows\syswow64\osmkhtmy.exe /install /install /install4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s5⤵PID:4732
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD516f7a0a349b11398ed2c8b0c1e84a715
SHA14f8af77baa7c8ab008925a1494a5a034eb3bceef
SHA25675e391b7f22fa2b6379af5c9b4e6588370ddbf4b2f1e3bce6bc6d31c446b084f
SHA51272714f47663b8eb15f19f240c4c1625deb5fdb987e2e36056de307a34365aaa6f545280d8c2ecb9a78c01c0e8cc2c7a1b69019cde59c7cfd157ea09ebf963854