Analysis
-
max time kernel
163s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 02:44
Static task
static1
Behavioral task
behavioral1
Sample
4d8fe77a34bd13fd59b183bdb877c444.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4d8fe77a34bd13fd59b183bdb877c444.exe
Resource
win10v2004-20231215-en
General
-
Target
4d8fe77a34bd13fd59b183bdb877c444.exe
-
Size
42KB
-
MD5
4d8fe77a34bd13fd59b183bdb877c444
-
SHA1
897e0fd8ee533a53cb6fa847fcdb5b5c1b55baad
-
SHA256
967222f8c657b546e83bac7cc75e4f701529ef7ea757c5fd087c62ea3c7788f9
-
SHA512
6106b1d8218bcbc472f521facc58f493e5e9d3b6f3de20960419e18b1e123c597465a0aaa5ef7d95bf2d49615b75d21706e739dd6c2600a82005037e31394ec3
-
SSDEEP
768:022lUaV2R6mqLDwprB+fV4YGIscBYzZy52J/Q6x6U:b6Uakvp0wcBh5kpx6U
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\1a0ab066.exe," 4d8fe77a34bd13fd59b183bdb877c444.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 4d8fe77a34bd13fd59b183bdb877c444.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2196 wrote to memory of 4820 2196 4d8fe77a34bd13fd59b183bdb877c444.exe 91 PID 2196 wrote to memory of 4820 2196 4d8fe77a34bd13fd59b183bdb877c444.exe 91 PID 2196 wrote to memory of 4820 2196 4d8fe77a34bd13fd59b183bdb877c444.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d8fe77a34bd13fd59b183bdb877c444.exe"C:\Users\Admin\AppData\Local\Temp\4d8fe77a34bd13fd59b183bdb877c444.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\4D8FE7~1.EXE >> NUL2⤵PID:4820
-