Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:28
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
06ebaf2987e30d528eefc6d7d8f77bae.exe
Resource
win7-20231215-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
06ebaf2987e30d528eefc6d7d8f77bae.exe
Resource
win10v2004-20231222-en
8 signatures
150 seconds
General
-
Target
06ebaf2987e30d528eefc6d7d8f77bae.exe
-
Size
70KB
-
MD5
06ebaf2987e30d528eefc6d7d8f77bae
-
SHA1
81c5ca20844a87ad4f7a43c609951a26edac18ae
-
SHA256
046d892e27aaa39359271bd36f4ca4cfd4150f5386980b812ddf20f1184df31e
-
SHA512
aa9e4fb3568d33a25758318012c0aa4fd1abd79e3293034ee1ff3dc44c041f4ad8ffc0c55efc57c4f41773cba4812dfdf11efb0fd3d4ff5fec68a4db34e8d424
-
SSDEEP
1536:i6CiPAd0KgAkeYwB3IqziF/vpR14TzNbEdcme6eIFytuGRsdoqZm:iDiYd0KgAkeYE3j4/vpR14NbScmlJEtd
Score
7/10
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Control Panel\International\Geo\Nation 06ebaf2987e30d528eefc6d7d8f77bae.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\System = "kdoqa.exe" 06ebaf2987e30d528eefc6d7d8f77bae.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\kdoqa.exe 06ebaf2987e30d528eefc6d7d8f77bae.exe File opened for modification C:\Windows\SysWOW64\kdoqa.exe 06ebaf2987e30d528eefc6d7d8f77bae.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 616 set thread context of 2364 616 06ebaf2987e30d528eefc6d7d8f77bae.exe 28 -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Control Panel\International\Geo 06ebaf2987e30d528eefc6d7d8f77bae.exe Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Control Panel\International 06ebaf2987e30d528eefc6d7d8f77bae.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 616 06ebaf2987e30d528eefc6d7d8f77bae.exe 616 06ebaf2987e30d528eefc6d7d8f77bae.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeSecurityPrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeTakeOwnershipPrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeLoadDriverPrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeSystemProfilePrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeSystemtimePrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeProfSingleProcessPrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeIncBasePriorityPrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeCreatePagefilePrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeBackupPrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeRestorePrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeShutdownPrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeDebugPrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeSystemEnvironmentPrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeChangeNotifyPrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeRemoteShutdownPrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeUndockPrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeManageVolumePrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeImpersonatePrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: SeCreateGlobalPrivilege 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: 33 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: 34 616 06ebaf2987e30d528eefc6d7d8f77bae.exe Token: 35 616 06ebaf2987e30d528eefc6d7d8f77bae.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 616 wrote to memory of 2072 616 06ebaf2987e30d528eefc6d7d8f77bae.exe 30 PID 616 wrote to memory of 2072 616 06ebaf2987e30d528eefc6d7d8f77bae.exe 30 PID 616 wrote to memory of 2072 616 06ebaf2987e30d528eefc6d7d8f77bae.exe 30 PID 616 wrote to memory of 2072 616 06ebaf2987e30d528eefc6d7d8f77bae.exe 30 PID 616 wrote to memory of 2364 616 06ebaf2987e30d528eefc6d7d8f77bae.exe 28 PID 616 wrote to memory of 2364 616 06ebaf2987e30d528eefc6d7d8f77bae.exe 28 PID 616 wrote to memory of 2364 616 06ebaf2987e30d528eefc6d7d8f77bae.exe 28 PID 616 wrote to memory of 2364 616 06ebaf2987e30d528eefc6d7d8f77bae.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\06ebaf2987e30d528eefc6d7d8f77bae.exe"C:\Users\Admin\AppData\Local\Temp\06ebaf2987e30d528eefc6d7d8f77bae.exe"1⤵
- Checks computer location settings
- Modifies WinLogon
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies Control Panel
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe2⤵PID:2364
-
-
C:\Windows\bfsvc.exeC:\Windows\bfsvc.exe2⤵PID:2072
-