Analysis
-
max time kernel
192s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 19:07
Static task
static1
Behavioral task
behavioral1
Sample
36bdda43e73997a8cf45bb551d74a351.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
36bdda43e73997a8cf45bb551d74a351.exe
Resource
win10v2004-20231215-en
General
-
Target
36bdda43e73997a8cf45bb551d74a351.exe
-
Size
113KB
-
MD5
36bdda43e73997a8cf45bb551d74a351
-
SHA1
b343cc61e39d7cfd27bd4d081c807f37522a5531
-
SHA256
629d7370d0c761234400ce6cd65eef3e1b974df6129e6e3bc7158a1d3ab9a3d0
-
SHA512
b9bb0f8a53e556684c29c3d578276d0384ee15aaf507a6dc76018c8f8da26f778bd265422565519d2a2b0535c0f22993ea774e46674f0f7da42705986e532504
-
SSDEEP
3072:aCU63Qs3SnhpLYTXPWXWT7QBTG3EUm9y9UFADUZD19:OeOZmiWEUmY9U6Di
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 36bdda43e73997a8cf45bb551d74a351.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\WinUpdaterstd = "C:\\Windows\\WinUpdaterstd\\svchost.exe" 36bdda43e73997a8cf45bb551d74a351.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 36bdda43e73997a8cf45bb551d74a351.exe -
Executes dropped EXE 1 IoCs
pid Process 2044 svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\WinUpdaterstd\svchost.exe 36bdda43e73997a8cf45bb551d74a351.exe File opened for modification C:\Windows\WinUpdaterstd\svchost.exe 36bdda43e73997a8cf45bb551d74a351.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2044 1304 36bdda43e73997a8cf45bb551d74a351.exe 90 PID 1304 wrote to memory of 2044 1304 36bdda43e73997a8cf45bb551d74a351.exe 90 PID 1304 wrote to memory of 2044 1304 36bdda43e73997a8cf45bb551d74a351.exe 90 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer 36bdda43e73997a8cf45bb551d74a351.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\36bdda43e73997a8cf45bb551d74a351.exe"C:\Users\Admin\AppData\Local\Temp\36bdda43e73997a8cf45bb551d74a351.exe"1⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1304 -
C:\Windows\WinUpdaterstd\svchost.exe"C:\Windows\WinUpdaterstd\svchost.exe"2⤵
- Executes dropped EXE
PID:2044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
113KB
MD536bdda43e73997a8cf45bb551d74a351
SHA1b343cc61e39d7cfd27bd4d081c807f37522a5531
SHA256629d7370d0c761234400ce6cd65eef3e1b974df6129e6e3bc7158a1d3ab9a3d0
SHA512b9bb0f8a53e556684c29c3d578276d0384ee15aaf507a6dc76018c8f8da26f778bd265422565519d2a2b0535c0f22993ea774e46674f0f7da42705986e532504