Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2023 15:05
Static task
static1
Behavioral task
behavioral1
Sample
77bd9a9ddfb5b84aa97ba08f75360756.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
77bd9a9ddfb5b84aa97ba08f75360756.exe
Resource
win10v2004-20231222-en
General
-
Target
77bd9a9ddfb5b84aa97ba08f75360756.exe
-
Size
561KB
-
MD5
77bd9a9ddfb5b84aa97ba08f75360756
-
SHA1
03980cc97d3b1ed2b1379aebfb75a2c9a68c670a
-
SHA256
64f6bed3f06ba8ef09531205314922a32ef9503d9846554e537d0df899a9b41e
-
SHA512
4a0c0a8a28a0fca539327f897ec16c109c3dc1919900c0cfa756a0c8e3fed1ca5f856f58a2e0ef204d50f69ed8b42654526e12e8a389d6ea15b0955dfa636b49
-
SSDEEP
12288:pM/DX9GrF9V12HLJvoHLJvKIHLJvoHLJva1e9Vnk9:pMLX8r/V1ILJeLJSmLJeLJi1AVnk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 77bd9a9ddfb5b84aa97ba08f75360756.exe -
Executes dropped EXE 1 IoCs
pid Process 4904 SVZ.AmyXan 1.1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4904 SVZ.AmyXan 1.1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4160 wrote to memory of 4904 4160 77bd9a9ddfb5b84aa97ba08f75360756.exe 91 PID 4160 wrote to memory of 4904 4160 77bd9a9ddfb5b84aa97ba08f75360756.exe 91 PID 4160 wrote to memory of 4904 4160 77bd9a9ddfb5b84aa97ba08f75360756.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\77bd9a9ddfb5b84aa97ba08f75360756.exe"C:\Users\Admin\AppData\Local\Temp\77bd9a9ddfb5b84aa97ba08f75360756.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Local\Temp\~sfx006CD0742C\SVZ.AmyXan 1.1.exe"C:\Users\Admin\AppData\Local\Temp\~sfx006CD0742C\SVZ.AmyXan 1.1.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD5446e384496f4dcf0e46aeb63fac4b3f1
SHA1dcfa0bc8bdd08718aba4a391fac4f88120941668
SHA256c5139af86dac359af65af29bc926fdd29b7f55ffc6e31ac944ebdbfbac0494b0
SHA5125abcc99cc6af80777cd8b6b6c6b2d2cf7cfe686b6e7c18788bdb8ddf493246de5568119158ac38c7d146569033effd77642b3a3d7078adaeddb52f501cb319be
-
Filesize
17KB
MD5dcd8fdba223e715f0932d12c411e9d50
SHA1e995f7c434485340ea4f1156202caa9022c40a8d
SHA256990043425b58e8b3873399b750a3aa6ab4144bbe69e232e7434aa78cecf8d6ea
SHA5126e6b26a80a91b6a02c8d464043646e994d2532017b5557c81c203c3e736c416115ff2b27d25542eb219ed0f8f6e724bd3d47174063b43a65000e7a57f0239da1