Analysis
-
max time kernel
38s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 13:14
Static task
static1
Behavioral task
behavioral1
Sample
716e784350b9adaa01db49b776e0574f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
716e784350b9adaa01db49b776e0574f.exe
Resource
win10v2004-20231215-en
General
-
Target
716e784350b9adaa01db49b776e0574f.exe
-
Size
673KB
-
MD5
716e784350b9adaa01db49b776e0574f
-
SHA1
b1e0cec52cff36622c1ff831bb818da4482d16e2
-
SHA256
e43a84db3f3b0363cb48893c781678a67145935baaac8aeaa5c463b032f0ac56
-
SHA512
3927e44c3f22ff9cb0b3a152781717913f39771f5b66da0861465f9562e49f4953ead20ece170d47ece3c822183bd9ecdc497736ec8979f313ed87437bfc572b
-
SSDEEP
12288:biLk2OhKTgC6y3NMO4wh/5LPmbU5jvFO2EYHrjHV0bvkTOYAYc1xSw:OLAC4whRbjvFL71akiYAhn
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 716e784350b9adaa01db49b776e0574f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1940 powershell.exe 1940 powershell.exe 2668 powershell.exe 2668 powershell.exe 2668 powershell.exe 3492 powershell.exe 3492 powershell.exe 3492 powershell.exe 3768 powershell.exe 3768 powershell.exe 3768 powershell.exe 3196 powershell.exe 3196 powershell.exe 3196 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1940 powershell.exe Token: SeIncreaseQuotaPrivilege 1940 powershell.exe Token: SeSecurityPrivilege 1940 powershell.exe Token: SeTakeOwnershipPrivilege 1940 powershell.exe Token: SeLoadDriverPrivilege 1940 powershell.exe Token: SeSystemProfilePrivilege 1940 powershell.exe Token: SeSystemtimePrivilege 1940 powershell.exe Token: SeProfSingleProcessPrivilege 1940 powershell.exe Token: SeIncBasePriorityPrivilege 1940 powershell.exe Token: SeCreatePagefilePrivilege 1940 powershell.exe Token: SeBackupPrivilege 1940 powershell.exe Token: SeRestorePrivilege 1940 powershell.exe Token: SeShutdownPrivilege 1940 powershell.exe Token: SeDebugPrivilege 1940 powershell.exe Token: SeSystemEnvironmentPrivilege 1940 powershell.exe Token: SeRemoteShutdownPrivilege 1940 powershell.exe Token: SeUndockPrivilege 1940 powershell.exe Token: SeManageVolumePrivilege 1940 powershell.exe Token: 33 1940 powershell.exe Token: 34 1940 powershell.exe Token: 35 1940 powershell.exe Token: 36 1940 powershell.exe Token: SeIncreaseQuotaPrivilege 1940 powershell.exe Token: SeSecurityPrivilege 1940 powershell.exe Token: SeTakeOwnershipPrivilege 1940 powershell.exe Token: SeLoadDriverPrivilege 1940 powershell.exe Token: SeSystemProfilePrivilege 1940 powershell.exe Token: SeSystemtimePrivilege 1940 powershell.exe Token: SeProfSingleProcessPrivilege 1940 powershell.exe Token: SeIncBasePriorityPrivilege 1940 powershell.exe Token: SeCreatePagefilePrivilege 1940 powershell.exe Token: SeBackupPrivilege 1940 powershell.exe Token: SeRestorePrivilege 1940 powershell.exe Token: SeShutdownPrivilege 1940 powershell.exe Token: SeDebugPrivilege 1940 powershell.exe Token: SeSystemEnvironmentPrivilege 1940 powershell.exe Token: SeRemoteShutdownPrivilege 1940 powershell.exe Token: SeUndockPrivilege 1940 powershell.exe Token: SeManageVolumePrivilege 1940 powershell.exe Token: 33 1940 powershell.exe Token: 34 1940 powershell.exe Token: 35 1940 powershell.exe Token: 36 1940 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeIncreaseQuotaPrivilege 2668 powershell.exe Token: SeSecurityPrivilege 2668 powershell.exe Token: SeTakeOwnershipPrivilege 2668 powershell.exe Token: SeLoadDriverPrivilege 2668 powershell.exe Token: SeSystemProfilePrivilege 2668 powershell.exe Token: SeSystemtimePrivilege 2668 powershell.exe Token: SeProfSingleProcessPrivilege 2668 powershell.exe Token: SeIncBasePriorityPrivilege 2668 powershell.exe Token: SeCreatePagefilePrivilege 2668 powershell.exe Token: SeBackupPrivilege 2668 powershell.exe Token: SeRestorePrivilege 2668 powershell.exe Token: SeShutdownPrivilege 2668 powershell.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeSystemEnvironmentPrivilege 2668 powershell.exe Token: SeRemoteShutdownPrivilege 2668 powershell.exe Token: SeUndockPrivilege 2668 powershell.exe Token: SeManageVolumePrivilege 2668 powershell.exe Token: 33 2668 powershell.exe Token: 34 2668 powershell.exe Token: 35 2668 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 912 wrote to memory of 1940 912 716e784350b9adaa01db49b776e0574f.exe 35 PID 912 wrote to memory of 1940 912 716e784350b9adaa01db49b776e0574f.exe 35 PID 912 wrote to memory of 1940 912 716e784350b9adaa01db49b776e0574f.exe 35 PID 912 wrote to memory of 2668 912 716e784350b9adaa01db49b776e0574f.exe 100 PID 912 wrote to memory of 2668 912 716e784350b9adaa01db49b776e0574f.exe 100 PID 912 wrote to memory of 2668 912 716e784350b9adaa01db49b776e0574f.exe 100 PID 912 wrote to memory of 3492 912 716e784350b9adaa01db49b776e0574f.exe 104 PID 912 wrote to memory of 3492 912 716e784350b9adaa01db49b776e0574f.exe 104 PID 912 wrote to memory of 3492 912 716e784350b9adaa01db49b776e0574f.exe 104 PID 912 wrote to memory of 3768 912 716e784350b9adaa01db49b776e0574f.exe 108 PID 912 wrote to memory of 3768 912 716e784350b9adaa01db49b776e0574f.exe 108 PID 912 wrote to memory of 3768 912 716e784350b9adaa01db49b776e0574f.exe 108 PID 912 wrote to memory of 3196 912 716e784350b9adaa01db49b776e0574f.exe 112 PID 912 wrote to memory of 3196 912 716e784350b9adaa01db49b776e0574f.exe 112 PID 912 wrote to memory of 3196 912 716e784350b9adaa01db49b776e0574f.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\716e784350b9adaa01db49b776e0574f.exe"C:\Users\Admin\AppData\Local\Temp\716e784350b9adaa01db49b776e0574f.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3492
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3768
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3196
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:4436
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:3100
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:640
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:3968
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:4432
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:2576
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:3244
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:4772
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:4464
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:1468
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:4628
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:1528
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection google.com2⤵PID:384
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Test-Connection bing.com2⤵PID:4548
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD53ec1be8669a65b492f86cb57c2962ae2
SHA1da9dc124b91e3a856a3017886efe10abe5d57623
SHA256a71e6a6ed0fc3cad79dd315b1ad8794b69ecae14a3ca3cbb900b24bc52a53e23
SHA512e0155027220e9f6bfcebb3db0b7f64a119176bbdde7fc47f25faaf92b129d523896a2aae317807ca903b4ead3cd58c13a641ef489c6574252ba7898a6d328ff8
-
Filesize
20KB
MD5da9c89f5248cbdcc1cefc6c46dbd5b38
SHA125f539fd553c8bd404ad34ae18432af9018e5d3d
SHA256c088ec93bf9f4251325e3bc10a25b2ad7dff73940e50e1d9ca853c8a2b25f564
SHA5122f082e6ce79ad05dec283f83c223ef0eab1b126d6d0690895ea913de9602ef16b0e53e29d1b0b065dcd278835e41249329a93573e57175d0beccd7a0a8ff5ee0
-
Filesize
20KB
MD52841e56203cb1fddf609d3216df6fd29
SHA1c1240068ac48773a20803bdd3f621b0d3a34a51b
SHA2563caa4c3694bf3c6b0c906e91578e5613c406d5b13b24d7577163fe7d7f918424
SHA512388c0d5b6da03e6737dd50a723335de633fa85cdfebc82fcc7c193af198adbc9ec065f5a01af9e951adb52c82c7f330a23e0b3251dbb059cb140fc82fb3503a5
-
Filesize
20KB
MD5e6c14a11bf75fe1a94a8fe10d271e932
SHA1cb18501f1c3f601b23f036d30a9d0b4c92da0a4d
SHA2568e1064d66ebaaf24499ff616bfd765c4523941c5f504ac833f83796b3bc0e1f7
SHA512e1613b8f467ec0913ef4619179fa0372cebc9fca0bd590eeaf0b7f1e5c1f223070cba27885f26050b6671db0e39db95543b512ac4422a055d0fb38effe785de8
-
Filesize
20KB
MD5c831cc68c26b5d15f48fd5b7eb3c0833
SHA1b5b57a62bac60dfbb6b83dde79b1d71ab5022b7c
SHA256881bc5fc4c9019fc70e157e2574e99d60e015c099b48e522f01d0037c0fdbbff
SHA51222eb43bf83650fa44dbdbfe5cce7fb104d82eb5d748aba683cd679bd637e72f1c2f5fa7066cf7acce1abc11079df7bb6f5c065142a33ae5c7b9b33cfce45d540
-
Filesize
20KB
MD5741fc4e281788be0c57c4e47cd90152a
SHA19749176c447ba362d0ce91a0d8ca95a36c8f8379
SHA2561c63d36634ee33fa233b064a0dd5b32728cde0982297c5ec82cc43722f404863
SHA512962a77ba4e69116ea7ff11d6db974b62cf04f235be98431cd1ea8cc535fd921efdf988407954e0ac7b1149873eff717656c32f2e45d521ab1a48ad84f9c9c82a
-
Filesize
20KB
MD5ae1c3a53e838fb8937d0f8168ca0ce59
SHA145fd241839429b190413effca8f4e84dd505e343
SHA2561fc12c520c55ead4ac2edbe0e7264305308b5a83e73825e20b5f0cfc94ebbbdd
SHA51201c1ee50458b66dd5fa080aa48eb69634d31800a41258728dc9e198c3b853f3f5d93148a94530bf1bd778464d1abc90616bb001a3238344b51e884cc9d335cb3
-
Filesize
19KB
MD5d3e5a424d634e46d5f1908361b908494
SHA1f951e154a2c2dbbdb1a38d07d56f789934db7183
SHA256de06fb36b418f6fb59db3d5150f619a67ceaa040d5298f0e3ce54836567c9771
SHA512e8c6bae73fe8ae7f5569b6d92494743bee81ba5930f6040306463e120dc9508aa9b64f2cc6dc228cb46dcdc862146e57b9eb6b7f1e87601148d8c5a7303903bb
-
Filesize
19KB
MD5e6951e69d942fa529d53612073b95727
SHA1568160b41f2cce602e2b5d4b0d36fcefc921d72d
SHA25682b81080a2dabd44396ac28f95163a96e158365c5e8a1213ac9092601a536f23
SHA51275843ba27a772f3eb041cf69d824efb1b7071f952132628da5b3e7cef0a6bdcf1b37ba525c60e80c85fde41d048be3a60f1ca68954e80ddc3c4242259f3dcdc3
-
Filesize
20KB
MD524e4139cc472f2d748310a2da3665625
SHA17964fc6d46bb9dba3303cce89d248e941a7ed6c6
SHA2565060b528d84c3f74e970a5d1d1464081902b7d8f09212f9926b8680483313f36
SHA5123a2bd9d870dc66b99518c59222fa4bcced8ef2316ae6c0e2f3ab70aa5e288324f11342a37db162fbab1b593441d6831ec7a1d237568b8188cd704f339682213e
-
Filesize
20KB
MD580c5972e2e7b5be029d65dbee3244c71
SHA1e0019d7cf2253c4086cf8952aaabeabbf4169795
SHA256103fa942ba38bc24ae119d871a6552f9be98c121ddbc34cd5b85329e1bd64677
SHA512ed34a9f1cd9698ccec987643d359b3d5ec62be506da6480683cf2a947fa5dab2a4d1fdd5af36019e5cad849532bd01d02eb8741bae82211d98d6bfc368779c90