Analysis
-
max time kernel
117s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
05d1914676b8e0d2a98c08c5b19a2ce8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05d1914676b8e0d2a98c08c5b19a2ce8.exe
Resource
win10v2004-20231215-en
General
-
Target
05d1914676b8e0d2a98c08c5b19a2ce8.exe
-
Size
55KB
-
MD5
05d1914676b8e0d2a98c08c5b19a2ce8
-
SHA1
96a69c2e360421660ba3933266fc88c3f31bfa6b
-
SHA256
e3565cb7966641be873c2e343d3ba134ddc7e52cee2b8f330fe96cda41774152
-
SHA512
d1fd553fe2adb85c19f8912ed212a4af94f3eb92088c142f05a5ae99fe9ea9edea285a0c4e5ac5c7c69f8406e02b7d99257b6c7436c6f30bd89b711d232c790f
-
SSDEEP
768:xyyD/8eMHCFpa7yjHDEY86sBkPwaQW7crxwsr2F8uElx4xQzC2ex0JoXIe+LrVU:xyiE8giDsF26jrc8uECVbi7ZU
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 05d1914676b8e0d2a98c08c5b19a2ce8.exe -
Executes dropped EXE 1 IoCs
pid Process 2668 ctfmon.exe -
Loads dropped DLL 1 IoCs
pid Process 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe -
resource yara_rule behavioral2/memory/3452-19-0x0000000010000000-0x000000001001F000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ctfmon.exe 05d1914676b8e0d2a98c08c5b19a2ce8.exe File opened for modification C:\Windows\ctfmon.exe 05d1914676b8e0d2a98c08c5b19a2ce8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1168 3452 WerFault.exe 16 -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3452 wrote to memory of 2668 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 93 PID 3452 wrote to memory of 2668 3452 05d1914676b8e0d2a98c08c5b19a2ce8.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\05d1914676b8e0d2a98c08c5b19a2ce8.exe"C:\Users\Admin\AppData\Local\Temp\05d1914676b8e0d2a98c08c5b19a2ce8.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Windows\ctfmon.exe"C:\Windows\ctfmon.exe"2⤵
- Executes dropped EXE
PID:2668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 11602⤵
- Program crash
PID:1168
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 3452 -ip 34521⤵PID:4544