Analysis
-
max time kernel
0s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 05:10
Static task
static1
Behavioral task
behavioral1
Sample
56e00ae0c259a4f53a31cebc65836bae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56e00ae0c259a4f53a31cebc65836bae.exe
Resource
win10v2004-20231215-en
General
-
Target
56e00ae0c259a4f53a31cebc65836bae.exe
-
Size
453KB
-
MD5
56e00ae0c259a4f53a31cebc65836bae
-
SHA1
c1028f238432baf7103ef1787e89ae6759a41a6a
-
SHA256
134528e1bb2df40721b844a7ca899bd8e4d7f5b336271d04727d0e25353bec59
-
SHA512
21dc4b682f31da16ec1644307beeda5a02cc9b9f62016418c0991f9dd07495a52baf9ec21f53548238c29e4ed89399d7414267b3b257f6b16683b1ea975f6704
-
SSDEEP
12288:Zdtcsp3glHl1s15Ap/G/8g3D0Fw/tN8dkmLtpHHHrh7E:ZP3uHl6j8gz0FmcLbH1E
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 56e00ae0c259a4f53a31cebc65836bae.exe -
Loads dropped DLL 6 IoCs
pid Process 5072 56e00ae0c259a4f53a31cebc65836bae.exe 5072 56e00ae0c259a4f53a31cebc65836bae.exe 5072 56e00ae0c259a4f53a31cebc65836bae.exe 5072 56e00ae0c259a4f53a31cebc65836bae.exe 5072 56e00ae0c259a4f53a31cebc65836bae.exe 5072 56e00ae0c259a4f53a31cebc65836bae.exe -
resource yara_rule behavioral2/memory/5072-91-0x0000000073740000-0x000000007374A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
Processes
-
C:\Users\Admin\AppData\Local\Temp\56e00ae0c259a4f53a31cebc65836bae.exe"C:\Users\Admin\AppData\Local\Temp\56e00ae0c259a4f53a31cebc65836bae.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
PID:5072 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -NoProfile -NoLogo -Command "Write-Host ($PSVersionTable.psversion)"2⤵PID:4548
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -inputformat none -NoProfile -NoLogo -Command "& {$avlist = @(); $os = Get-WmiObject Win32_OperatingSystem; if ($os.ProductType -eq 3) {Write-Host \"ServerOS^|0\";} elseif ($os.Version -like \"5.*\") {Get-WmiObject -Namespace root\SecurityCenter -Class AntiVirusProduct | ForEach-Object {Write-Host \"$($_.displayName)^|$(if ($_.onAccessScanningEnabled) {\"4096\"} else {\"0\"})\"};} else {Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiVirusProduct | ForEach-Object {$avlist += \"$($_.displayName)^|$($_.productState)\"};Get-WmiObject -Namespace root\SecurityCenter2 -Class AntiSpywareProduct | ForEach-Object {$avlist += \"$($_.displayName)^|$($_.productState)\"};} Write-Host ($avlist -join \"^*\")}"2⤵PID:3240
-