Analysis
-
max time kernel
88s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
529ea50fb163f9cdf4712ff72c3ce805.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
529ea50fb163f9cdf4712ff72c3ce805.exe
Resource
win10v2004-20231222-en
General
-
Target
529ea50fb163f9cdf4712ff72c3ce805.exe
-
Size
325KB
-
MD5
529ea50fb163f9cdf4712ff72c3ce805
-
SHA1
ebd3f53c65158a5a2a66a4c1b4e0d6faeb5387e8
-
SHA256
e5f97620d369f0aea9026410dd7f1bf1ab7ea6d7cfc6978d3944198bcc238055
-
SHA512
d27b5a645213b4330ced5efabbc35e8b615eaa3229249623fd480aa0fe40eb6dd5eef1a08b76d31286137e7856f7b3da03ecb01fb786963772d4fd17edaced75
-
SSDEEP
6144:ye34WsD8/AQi6/9sSZkHgRCrIt7nStZFsASnUy2dU+KCsAQhGlmoNjIUpmeAUVBH:xsD8PB/uKPcmS7FsA8Uy2nK3AQYlvNBp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 529ea50fb163f9cdf4712ff72c3ce805.exe -
Loads dropped DLL 5 IoCs
pid Process 1272 529ea50fb163f9cdf4712ff72c3ce805.exe 1272 529ea50fb163f9cdf4712ff72c3ce805.exe 1272 529ea50fb163f9cdf4712ff72c3ce805.exe 1272 529ea50fb163f9cdf4712ff72c3ce805.exe 1272 529ea50fb163f9cdf4712ff72c3ce805.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\System32\DriverStore\FileRepository\display.inf_amd64_71aa85b0e2292a7a\display.PNF 529ea50fb163f9cdf4712ff72c3ce805.exe File created C:\Windows\System32\DriverStore\FileRepository\input.inf_amd64_adeb6424513f60a2\input.PNF 529ea50fb163f9cdf4712ff72c3ce805.exe File created C:\Windows\System32\DriverStore\FileRepository\keyboard.inf_amd64_5938c699b80ebb8f\keyboard.PNF 529ea50fb163f9cdf4712ff72c3ce805.exe File created C:\Windows\System32\DriverStore\FileRepository\netrtl64.inf_amd64_8e9c2368fe308df2\netrtl64.PNF 529ea50fb163f9cdf4712ff72c3ce805.exe File created C:\Windows\System32\DriverStore\FileRepository\mshdc.inf_amd64_0d06b6638bdb4763\mshdc.PNF 529ea50fb163f9cdf4712ff72c3ce805.exe File created C:\Windows\System32\DriverStore\FileRepository\machine.inf_amd64_b748590104fe1c15\machine.PNF 529ea50fb163f9cdf4712ff72c3ce805.exe File created C:\Windows\System32\DriverStore\FileRepository\usbport.inf_amd64_254cd5ae09de6b08\usbport.PNF 529ea50fb163f9cdf4712ff72c3ce805.exe File created C:\Windows\System32\DriverStore\FileRepository\msmouse.inf_amd64_1793a485b491b199\msmouse.PNF 529ea50fb163f9cdf4712ff72c3ce805.exe File created C:\Windows\System32\DriverStore\FileRepository\hdaudbus.inf_amd64_533c8d455025cc59\hdaudbus.PNF 529ea50fb163f9cdf4712ff72c3ce805.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\HardwareID 529ea50fb163f9cdf4712ff72c3ce805.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\CompatibleIDs 529ea50fb163f9cdf4712ff72c3ce805.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\CompatibleIDs 529ea50fb163f9cdf4712ff72c3ce805.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_DADY&PROD_DADY_DVD-ROM\4&215468A5&0&010000 529ea50fb163f9cdf4712ff72c3ce805.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_DADY&Prod_DADY_DVD-ROM\4&215468a5&0&010000\HardwareID 529ea50fb163f9cdf4712ff72c3ce805.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_DADY&PROD_HARDDISK\4&215468A5&0&000000 529ea50fb163f9cdf4712ff72c3ce805.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings 529ea50fb163f9cdf4712ff72c3ce805.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1272 529ea50fb163f9cdf4712ff72c3ce805.exe 1272 529ea50fb163f9cdf4712ff72c3ce805.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1272 529ea50fb163f9cdf4712ff72c3ce805.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1272 wrote to memory of 5080 1272 529ea50fb163f9cdf4712ff72c3ce805.exe 94 PID 1272 wrote to memory of 5080 1272 529ea50fb163f9cdf4712ff72c3ce805.exe 94 PID 1272 wrote to memory of 5080 1272 529ea50fb163f9cdf4712ff72c3ce805.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\529ea50fb163f9cdf4712ff72c3ce805.exe"C:\Users\Admin\AppData\Local\Temp\529ea50fb163f9cdf4712ff72c3ce805.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Checks SCSI registry key(s)
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\Documents\ŠÂ‹«î•ñ_poisonchain.txt2⤵PID:5080
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a293e99fd5576dc0f91666d4cd905a5c
SHA177b50d862e06a1eb12c94c5f5d6d7c7c1a3a5360
SHA256123d4c7037deb56842b4199eefede319f0298e1d98e052e60c302cc2b17b2c37
SHA51278bbdce55e60c9760551bee9a76a4115cbe1b004f05992f44f275bbb3416f0ecc0355f805da24561fb113f485b1e13dfc417c93d3842e82e4117f8b52875463f
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
315B
MD534e435a988c1dd27eef6583a643338dd
SHA10e9a0635a438438507a773a592e62706e900d82d
SHA2565fb5344bd032f03389326ac8c5180d379a679f87fb3253a7a81d0e983567e91d
SHA51282c71035c8aec72ad29e6be01cab1d872d3892f77bb99a252f062435de65d0cdb50f73fd7896e9aa805b183662a7cd3edc4caa8c176dbaeba5011d9458ea8a0d
-
Filesize
8KB
MD5698944f85d78a0d669ebb77673021ab7
SHA15f65627d6e4d55ca2de9c2ba242974c2db7279cb
SHA2561b66a8aea1a2e7343955b5bbab4fccafb5e30d9ed4d85e45c5407a72018a2301
SHA5121c7342da4ef49b0ff60ed23caf467214d9e15d64ba1bcf8d84cd51f3186627687f08dc1519b5286b1cd357146d26ca1f387d659957461fbeebe67a84ae9f33f1