Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 23:10
Behavioral task
behavioral1
Sample
068d26435d35d2df85ea562826b41ab3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
068d26435d35d2df85ea562826b41ab3.exe
Resource
win10v2004-20231215-en
General
-
Target
068d26435d35d2df85ea562826b41ab3.exe
-
Size
5KB
-
MD5
068d26435d35d2df85ea562826b41ab3
-
SHA1
7d8661986b8f25e8075b205ea0d2df3efb9ec800
-
SHA256
5e9fb590ba4cf65f41e5e7946e3a61dc83cd48937b8b79fe03c0f9cc2f6e62ce
-
SHA512
8d1f927c14ecf76179f6e8952acaa5401c1e27f9008445dba1e28db606f61baa8702e072276ebcd84d03b790fd108cdd6b9db9ead07205e26941f67583dfda7a
-
SSDEEP
96:IPSZKzW2wsZpbGpTwPg4CE7sN53wgBsSfiFbt/6GmOHJ:eSaipkP7CEQXnNo968HJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 068d26435d35d2df85ea562826b41ab3.exe -
resource yara_rule behavioral2/memory/4944-0-0x0000000000400000-0x0000000000406000-memory.dmp upx behavioral2/memory/4944-1-0x0000000000400000-0x0000000000406000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4604 4944 WerFault.exe 16 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4944 wrote to memory of 3656 4944 068d26435d35d2df85ea562826b41ab3.exe 25 PID 4944 wrote to memory of 3656 4944 068d26435d35d2df85ea562826b41ab3.exe 25 PID 4944 wrote to memory of 3656 4944 068d26435d35d2df85ea562826b41ab3.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\068d26435d35d2df85ea562826b41ab3.exe"C:\Users\Admin\AppData\Local\Temp\068d26435d35d2df85ea562826b41ab3.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\068d26435d35d2df85ea562826b41ab3.exe > nul2⤵PID:3656
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4944 -s 15402⤵
- Program crash
PID:4604
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 4944 -ip 49441⤵PID:1448