Analysis
-
max time kernel
169s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 00:36
Static task
static1
Behavioral task
behavioral1
Sample
46dbe36800ace2a61787385d25eed3df.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46dbe36800ace2a61787385d25eed3df.exe
Resource
win10v2004-20231215-en
General
-
Target
46dbe36800ace2a61787385d25eed3df.exe
-
Size
344KB
-
MD5
46dbe36800ace2a61787385d25eed3df
-
SHA1
2f322dd44d1cb1391e2490f2ef8b5295340ebafe
-
SHA256
66a31796073ae26a300cd7d08b70d045a4769baf7f174dedc9c0ff27a4089e98
-
SHA512
914a71be9d9ef83314a27042e41632166086d8453b9514ea5842f5bbe448231166c050543b2a67e5c3504e3d283d9fdc76e5708f52503cb133d31c4d0455be87
-
SSDEEP
6144:f4k74jYxa2ROkk6zWNdt6cfNiKbWvIPczb7eUk:f4k7RxasOkk/rN
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 46dbe36800ace2a61787385d25eed3df.exe -
Executes dropped EXE 2 IoCs
pid Process 1852 Game.exe 2744 Game.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1852 set thread context of 2744 1852 Game.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1404 46dbe36800ace2a61787385d25eed3df.exe 1852 Game.exe 2744 Game.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1404 wrote to memory of 1852 1404 46dbe36800ace2a61787385d25eed3df.exe 91 PID 1404 wrote to memory of 1852 1404 46dbe36800ace2a61787385d25eed3df.exe 91 PID 1404 wrote to memory of 1852 1404 46dbe36800ace2a61787385d25eed3df.exe 91 PID 1852 wrote to memory of 2744 1852 Game.exe 93 PID 1852 wrote to memory of 2744 1852 Game.exe 93 PID 1852 wrote to memory of 2744 1852 Game.exe 93 PID 1852 wrote to memory of 2744 1852 Game.exe 93 PID 1852 wrote to memory of 2744 1852 Game.exe 93 PID 1852 wrote to memory of 2744 1852 Game.exe 93 PID 1852 wrote to memory of 2744 1852 Game.exe 93 PID 1852 wrote to memory of 2744 1852 Game.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\46dbe36800ace2a61787385d25eed3df.exe"C:\Users\Admin\AppData\Local\Temp\46dbe36800ace2a61787385d25eed3df.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\Game.exe"C:\Users\Admin\AppData\Local\Temp\Game.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\Game.exeC:\Users\Admin\AppData\Local\Temp\Game.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD57954d94f629b8fc72048acd7be4ecf15
SHA16d328030db8493407ca8faeb22b32686c7e1c03d
SHA256c131ce2bba0f532751b75b24905b1accad976b9986005092de679d5c58dd82af
SHA51204f4463aa8a460eedb9404112724dce1fd937be1244ca7b9bb70acca724a171bcbcc6f26198aadcda140bb84a746aaa4575fe978b58cb5ecb8b0cc963be9036f