Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 03:10
Static task
static1
Behavioral task
behavioral1
Sample
4f283dddeb67ebdc38dae56f6fb6c7e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4f283dddeb67ebdc38dae56f6fb6c7e4.exe
Resource
win10v2004-20231215-en
General
-
Target
4f283dddeb67ebdc38dae56f6fb6c7e4.exe
-
Size
49KB
-
MD5
4f283dddeb67ebdc38dae56f6fb6c7e4
-
SHA1
c0b8f8033f0c9e142fd4e759c5e12cff81ba08de
-
SHA256
8f14aff18a1b1cefa087859bb308a947c75eb5cec87faff952dcd5310d9fd4b8
-
SHA512
a74803fd57cc944d0247eabbd0203ab1a5c98ee8438f40fa273886f5bf4c9b06c6424efcaaf5628f03931730aa7a4a1264719d6af5d4b7276e3ad9f931437453
-
SSDEEP
768:o1lheHQLtf3ti0sn7Rssu4KF3iH2r7tBxTz:6lhegy/nhu4KF3g2r75Tz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 4f283dddeb67ebdc38dae56f6fb6c7e4.exe -
Executes dropped EXE 1 IoCs
pid Process 1780 wupdmgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System Update = "c:\\users\\admin\\appdata\\roaming\\wupdmgr.exe" 4f283dddeb67ebdc38dae56f6fb6c7e4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4460 wrote to memory of 1780 4460 4f283dddeb67ebdc38dae56f6fb6c7e4.exe 91 PID 4460 wrote to memory of 1780 4460 4f283dddeb67ebdc38dae56f6fb6c7e4.exe 91 PID 4460 wrote to memory of 1780 4460 4f283dddeb67ebdc38dae56f6fb6c7e4.exe 91 PID 4460 wrote to memory of 1524 4460 4f283dddeb67ebdc38dae56f6fb6c7e4.exe 92 PID 4460 wrote to memory of 1524 4460 4f283dddeb67ebdc38dae56f6fb6c7e4.exe 92 PID 4460 wrote to memory of 1524 4460 4f283dddeb67ebdc38dae56f6fb6c7e4.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f283dddeb67ebdc38dae56f6fb6c7e4.exe"C:\Users\Admin\AppData\Local\Temp\4f283dddeb67ebdc38dae56f6fb6c7e4.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\appdata\roaming\wupdmgr.exe"C:\Users\Admin\appdata\roaming\wupdmgr.exe"2⤵
- Executes dropped EXE
PID:1780
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del c:\users\admin\appdata\local\temp\4f283d~1.exe >nul2⤵PID:1524
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD54f283dddeb67ebdc38dae56f6fb6c7e4
SHA1c0b8f8033f0c9e142fd4e759c5e12cff81ba08de
SHA2568f14aff18a1b1cefa087859bb308a947c75eb5cec87faff952dcd5310d9fd4b8
SHA512a74803fd57cc944d0247eabbd0203ab1a5c98ee8438f40fa273886f5bf4c9b06c6424efcaaf5628f03931730aa7a4a1264719d6af5d4b7276e3ad9f931437453