Analysis
-
max time kernel
1s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
28-12-2023 22:54
Static task
static1
Behavioral task
behavioral1
Sample
fe2f0e26f68c1c9bdb2b37b962e13761.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fe2f0e26f68c1c9bdb2b37b962e13761.exe
Resource
win10v2004-20231215-en
General
-
Target
fe2f0e26f68c1c9bdb2b37b962e13761.exe
-
Size
125KB
-
MD5
fe2f0e26f68c1c9bdb2b37b962e13761
-
SHA1
1c1f7d91c7981dc4ab312361e6d709383082f731
-
SHA256
79141b65df2998bd3ca9ae23779963466a753a0aaf88549c2337949dc9f149dc
-
SHA512
2d5710741415c758b4af2e1b1b076ecb2ded31abe5cfbd24b70d0c777fe56381d132462fdbaa9e63013beb3937370617ad707f9d7203ab118f6694ae695eb925
-
SSDEEP
3072:EGu9BlfzWIbXWm+w0JF5omFV5aT72PUEABiyxj7BygUnn:E/0uopVkT7SUnRygK
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7890g421-b1gf-14d0-89bb-0090ce808e85} BackgroundTransferHost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7890g421-b1gf-14d0-89bb-0090ce808e85}\StubPath = "C:\\Windows\\system32\\System64.exe" BackgroundTransferHost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation ¸´¼þ5~1.EXE -
Executes dropped EXE 2 IoCs
pid Process 908 ¸´¼þ5~1.EXE 3540 BackgroundTransferHost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" fe2f0e26f68c1c9bdb2b37b962e13761.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\System64.exe BackgroundTransferHost.exe File opened for modification C:\Windows\SysWOW64\System64.exe BackgroundTransferHost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\program files\common files\microsoft shared\msinfo\¸´¼þ Server.jpg ¸´¼þ5~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 3208 3088 WerFault.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2936 wrote to memory of 908 2936 fe2f0e26f68c1c9bdb2b37b962e13761.exe 28 PID 2936 wrote to memory of 908 2936 fe2f0e26f68c1c9bdb2b37b962e13761.exe 28 PID 2936 wrote to memory of 908 2936 fe2f0e26f68c1c9bdb2b37b962e13761.exe 28 PID 908 wrote to memory of 3540 908 ¸´¼þ5~1.EXE 112 PID 908 wrote to memory of 3540 908 ¸´¼þ5~1.EXE 112 PID 908 wrote to memory of 3540 908 ¸´¼þ5~1.EXE 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe2f0e26f68c1c9bdb2b37b962e13761.exe"C:\Users\Admin\AppData\Local\Temp\fe2f0e26f68c1c9bdb2b37b962e13761.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ5~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ5~1.EXE2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:908 -
C:\program files\common files\microsoft shared\msinfo\¸´¼þ Server.exe"C:\program files\common files\microsoft shared\msinfo\¸´¼þ Server.exe"3⤵PID:3540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3088 -ip 30881⤵PID:4700
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 121⤵
- Program crash
PID:3208
-
C:\Windows\SysWOW64\userinit.exe"C:\Windows\system32\userinit.exe"1⤵PID:3088
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\system32\KMe.bat1⤵PID:4348
-
C:\Windows\SysWOW64\System64.exe"C:\Windows\system32\System64.exe"1⤵PID:3656
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
PID:3540
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12KB
MD5699b15d5136fc77fdaa358d088b7cff3
SHA1eda01927c8b274e4abf1e502f5e89e576f24b309
SHA25634b408cc7387e8aa505ac9f4f997a806178baad51ecc9593f381658edbe752cd
SHA512b9eaf779f6a9dc327ae42a77fe8efb17431ffb4c35b7622c072dc69862cb5c5e76921d1418553f2c3fda75a77f89cf125fe61d68aede7f3d462eab7ee369376b
-
Filesize
50KB
MD5bd6d8d56d93e724ddf63e7e54f721641
SHA1f85297df11bb6f96be9c22dbbd3be50e7f0d1ac3
SHA256299b8bd412df3fa8e84b3be802e7b6e5b2053a95084cbf6d87244e27cd326a22
SHA51268319fc20ef446ad94e1c096fc78b9f83e084cbeec031379ef33d80ab82d50c1e2fe768180b29d265b1456ee66d40cb071d63cf57aa5ba9460ec86280edaba0f
-
Filesize
67KB
MD5c1855d4f6b941746398995d2c5f1e4eb
SHA10df966138bf596487519eb1fe7a1c1f2fc9f816f
SHA256e31e99ffa22085623e26bc5701716ea81a6d149e58e25762f953fde46a8583a6
SHA51217e77dd374c5732f3d558fd4d7a31d12f5f237d24ed2db243fa78eb940f9766785176036472e61e183611c369553a4a01c5fc6b687080f96afcd4799193f2b29
-
Filesize
33KB
MD534bee1a290496dad6190fa0f0c1df6c8
SHA14e07fda1390dde5e9d317c414edfb4c7b9be96fa
SHA25634681e0a4f7d6e5d26e9fbef1a9f2d82ad8b34aad39efb8effc3bac798beb0bd
SHA5120c391721769e222304181a3e9ee1bd54f14ab7496d27aabdd25008bde434c59514a16675bf5ad49d4e18e7120208d83564c9bc1def73d00864030d6fd5026bec
-
Filesize
85B
MD56715f0eb80f4bb9dd4f3fef821bc4c44
SHA13ede4eda0561b53882facc0d82666082c2ec5d0b
SHA256c59869fb189a95c56e48066501ac654ad461e517a9c91bb021803a2a968c1fa8
SHA5124073571509d92104e53c1a3377c341856d85e06102eace2bfe75c7a6cf0ebb0031bc950a355059be65fb9d5c75e17d6b46274f7c4befa2a3bf845e7f0fed1e38
-
Filesize
40KB
MD52062587c5b99a01046232a26617e3204
SHA13ca7ced2059160db843cf97fb50d5e274cc5cf26
SHA25626d6d398b28d3cc37024bcc01e81dc7bd065f0520bb361ac3e91db1ed96961f1
SHA512fcf1b853c0445ae8986fc0fb3c59d9c20e3bdec443594794e62bc44ef1df0d3b6e3a900b76f09a788d7926faa058f8c46b0b1985580b5f038a5e68f02f0b5e3c
-
Filesize
23KB
MD5d133b08ab31ef733169ce8117146b767
SHA125eb5d4f6b8d5ba44ee9f4af1171d196807e93b2
SHA256df178b5c15bab05cafcb705d0f5bc8a6cfdc1a0550f968cb0d611526108a5e68
SHA5120da499444ccda3d85f068f17e3fb26d42440a8bea6f201034dc5f36ef8222b13ddc522f84fe82985fe712c101c3b3a09a59b6d85732cf812f1fbc491261d4020
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
28KB
MD5dab84332f56f504c2f829d3dbbdac87e
SHA136eb8649696e3fa4c9400496d973e1a803e8c125
SHA25671f0a0ec7893f7a4782013f4a7ff9a137bbab322a273419d5e0b4c4aa374b65e
SHA51238860bdb42fa025f4088ba3b93d1578b057a3b8b50116985c5a29e41ca86811e1cf96d8cf56c797f13ac2db068f873123c5490fd8429fc9b9f0968948f29b43a
-
Filesize
55KB
MD55c4465db267c20280494b199c094f778
SHA1b58c93584aeb13f4b88b1d76cbe857bae4f4769c
SHA256d4e78e6921aa41b0770405edd2378184e84bbccd0d23494edbfd9ab97bd44b0a
SHA5126fdf898baf56e45fda65ad6d4060f9f4af5f72099dd14e1baba50e41b39ee32924bcddc5d5e317d1f1645a205b925d30f1824e30ee30764eec10dfb0ee5790d6