Analysis
-
max time kernel
144s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 01:26
Behavioral task
behavioral1
Sample
493610666610bb568fb1fb2a29dfc86a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
493610666610bb568fb1fb2a29dfc86a.exe
Resource
win10v2004-20231215-en
General
-
Target
493610666610bb568fb1fb2a29dfc86a.exe
-
Size
531KB
-
MD5
493610666610bb568fb1fb2a29dfc86a
-
SHA1
96364789f310a0d3747e538d88cf38bd89cd7eba
-
SHA256
98c830e1f593c1eae961b44822ac2990df90e214aad17cc9c3caf19b09005f7e
-
SHA512
a5bb73054286b49f208267bcfff8cc0794b2fce111a159229c72e1f7dcb37a91d4d47a92925364b2fa3875e3807cc9424b87c22623a75d19e8d7b2ad866a0167
-
SSDEEP
12288:2Qv0eBwZPTf7+y1dKluklBIy/8YwA7GH4:H82Wb7+SEP/RJG4
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,riodrv.exe" 493610666610bb568fb1fb2a29dfc86a.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 493610666610bb568fb1fb2a29dfc86a.exe -
Executes dropped EXE 1 IoCs
pid Process 2480 riodrv.exe -
resource yara_rule behavioral2/memory/2284-0-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/files/0x000c00000002315d-6.dat upx behavioral2/memory/2480-12-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/files/0x000c00000002315d-10.dat upx behavioral2/memory/2284-11-0x0000000000400000-0x0000000000486000-memory.dmp upx behavioral2/memory/2480-14-0x0000000000400000-0x0000000000486000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\riodrv.exe 493610666610bb568fb1fb2a29dfc86a.exe File created C:\Windows\SysWOW64\riodrv.exe 493610666610bb568fb1fb2a29dfc86a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2284 wrote to memory of 2480 2284 493610666610bb568fb1fb2a29dfc86a.exe 26 PID 2284 wrote to memory of 2480 2284 493610666610bb568fb1fb2a29dfc86a.exe 26 PID 2284 wrote to memory of 2480 2284 493610666610bb568fb1fb2a29dfc86a.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\493610666610bb568fb1fb2a29dfc86a.exe"C:\Users\Admin\AppData\Local\Temp\493610666610bb568fb1fb2a29dfc86a.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\riodrv.exe"C:\Windows\system32\riodrv.exe"2⤵
- Executes dropped EXE
PID:2480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5251dcc031a535081661bd38f496d48fe
SHA142d4d48d346ec995c406eef5b1c1fbfd5d3b79ae
SHA256bb2319676e06cc005e373ec7e672558ad700043b92100ca33ff691e82d0bade1
SHA512a640eec4221fa0655fc9447ec8fd535e708e86940357d35c387520d6156a38b7541efe6b35435b9d6c860f4adcb35f9a760aafb9585e3a385056976cc68c05df
-
Filesize
531KB
MD5f68d82da4f4b2b1f15afeea90e56bfdd
SHA18693d895f432b2081049f6eb0b0c80bc98f44075
SHA256899f1dc0a52fa15d19ba45ce58a9fcae8409540d277c83f2d4e19df00bd5c6dd
SHA5127bcf2646f6d4da611985936c2955e61d93a5ac9052b1cf0c7e9ccbc5f6749ae4cbdc0fed4a9d36e829819b454d0c8b60b2d9414b39f836e00bc5acd66dd7b91e