Analysis
-
max time kernel
146s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 14:52
Static task
static1
Behavioral task
behavioral1
Sample
76fc61e82ae294cf2641dd0f7c11e5fd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
76fc61e82ae294cf2641dd0f7c11e5fd.exe
Resource
win10v2004-20231215-en
General
-
Target
76fc61e82ae294cf2641dd0f7c11e5fd.exe
-
Size
136KB
-
MD5
76fc61e82ae294cf2641dd0f7c11e5fd
-
SHA1
ec36b298896db3b288deeb08927b65981f1ead22
-
SHA256
dc1892a25986f487d241f6334319606bd0d3c8fc0ea42a296b968438f43b211a
-
SHA512
fb98c7abab3890ec30dc22afb48be9977b694d79248d804d359f680caa543c0e9e1f4eb4cf9c4dec17cec32fce12fbc57611d6929569abffbe20e0b3e4d83037
-
SSDEEP
3072:5gJ7HQ8C3md93BUVWECe30jXluFJ9xmdZTN/II8:iVHIAkVw6JzmPNE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 76fc61e82ae294cf2641dd0f7c11e5fd.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created C:\Windows\SysWOW64\wuauclt32.dll 76fc61e82ae294cf2641dd0f7c11e5fd.exe File created C:\Windows\SysWOW64\script.txt 76fc61e82ae294cf2641dd0f7c11e5fd.exe File created C:\Windows\SysWOW64\windlogon.exe 76fc61e82ae294cf2641dd0f7c11e5fd.exe File created C:\Windows\SysWOW64\installer.exe 76fc61e82ae294cf2641dd0f7c11e5fd.exe File created C:\Windows\SysWOW64\wmob.exe 76fc61e82ae294cf2641dd0f7c11e5fd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4944 wrote to memory of 3052 4944 76fc61e82ae294cf2641dd0f7c11e5fd.exe 93 PID 4944 wrote to memory of 3052 4944 76fc61e82ae294cf2641dd0f7c11e5fd.exe 93 PID 4944 wrote to memory of 3052 4944 76fc61e82ae294cf2641dd0f7c11e5fd.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\76fc61e82ae294cf2641dd0f7c11e5fd.exe"C:\Users\Admin\AppData\Local\Temp\76fc61e82ae294cf2641dd0f7c11e5fd.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe wuauclt32.dll, network2⤵PID:3052
-