Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
53e293069ed124d113a302cade13bf4f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53e293069ed124d113a302cade13bf4f.exe
Resource
win10v2004-20231215-en
General
-
Target
53e293069ed124d113a302cade13bf4f.exe
-
Size
72KB
-
MD5
53e293069ed124d113a302cade13bf4f
-
SHA1
074cadb8978b907e45f3f9e0dd9003fd354ba654
-
SHA256
51c65ff22cabca947fc56764ecdfed28755bb2ff55ff556d1bd78b0519a640d8
-
SHA512
a077ce135f8b40f8f42df182c8d5f37ee5bb0666035d09400fb19af27f4ecc9ef80138aad9ca763cf4f672b86b22a7727b60e84e9a3f92a538e1a66eefad32a6
-
SSDEEP
768:CYyJIK/RsskYjUyXGey9yzYyhSda+I6NrZn5ytwg3HFpYPllLLv7G4CV4BDvIiy0:CXJbNUy27kjN6NJ5yVX8PlddvIiyFHB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 53e293069ed124d113a302cade13bf4f.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 53e293069ed124d113a302cade13bf4f.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 53e293069ed124d113a302cade13bf4f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2104 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2104 tasklist.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1996 53e293069ed124d113a302cade13bf4f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1996 wrote to memory of 3168 1996 53e293069ed124d113a302cade13bf4f.exe 95 PID 1996 wrote to memory of 3168 1996 53e293069ed124d113a302cade13bf4f.exe 95 PID 1996 wrote to memory of 3168 1996 53e293069ed124d113a302cade13bf4f.exe 95 PID 3168 wrote to memory of 2104 3168 cmd.exe 97 PID 3168 wrote to memory of 2104 3168 cmd.exe 97 PID 3168 wrote to memory of 2104 3168 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\53e293069ed124d113a302cade13bf4f.exe"C:\Users\Admin\AppData\Local\Temp\53e293069ed124d113a302cade13bf4f.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 53e293069ed124d113a302cade13bf4f.e2⤵
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-