Analysis
-
max time kernel
147s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 23:39
Behavioral task
behavioral1
Sample
07309db619f1e83a147640ea0956b0de.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
07309db619f1e83a147640ea0956b0de.exe
Resource
win10v2004-20231215-en
General
-
Target
07309db619f1e83a147640ea0956b0de.exe
-
Size
808KB
-
MD5
07309db619f1e83a147640ea0956b0de
-
SHA1
d8cd86ddf06b933e6d25d1dfaa05e38986d03cb9
-
SHA256
852bb9f9d2503697f87e7a1745021ace532a27c57aa208d491aed11ce5ed4ad7
-
SHA512
8a4842e6fa3bc0692798ec9a3ead0b2f11446a4c603cb903febb47dcdf462a7c5d26554a0c8f3684e906dc894d4e5d7a362a23f0df204eb08e0976a2590a44c8
-
SSDEEP
24576:mFHfHCvj8p2IG5ET3VQGSQeIbSkNW+gWGc3:mFAWGnGSCS2W+HGc3
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 07309db619f1e83a147640ea0956b0de.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 07309db619f1e83a147640ea0956b0de.exe -
Executes dropped EXE 2 IoCs
pid Process 2528 000.exe 2456 2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process 4656 2528 WerFault.exe 4360 2456 WerFault.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1744 wrote to memory of 2528 1744 07309db619f1e83a147640ea0956b0de.exe 30 PID 1744 wrote to memory of 2528 1744 07309db619f1e83a147640ea0956b0de.exe 30 PID 1744 wrote to memory of 2528 1744 07309db619f1e83a147640ea0956b0de.exe 30 PID 1744 wrote to memory of 2456 1744 07309db619f1e83a147640ea0956b0de.exe 27 PID 1744 wrote to memory of 2456 1744 07309db619f1e83a147640ea0956b0de.exe 27 PID 1744 wrote to memory of 2456 1744 07309db619f1e83a147640ea0956b0de.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\07309db619f1e83a147640ea0956b0de.exe"C:\Users\Admin\AppData\Local\Temp\07309db619f1e83a147640ea0956b0de.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\2.exe"C:\Users\Admin\AppData\Local\Temp\2.exe"2⤵
- Executes dropped EXE
PID:2456
-
-
C:\Users\Admin\AppData\Local\Temp\000.exe"C:\Users\Admin\AppData\Local\Temp\000.exe"2⤵
- Executes dropped EXE
PID:2528
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 2456 -ip 24561⤵PID:3752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 2528 -ip 25281⤵PID:2772
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 3121⤵
- Program crash
PID:4656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 3121⤵
- Program crash
PID:4360
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
94KB
MD5d12fa01ca1ce31dc26078abdfc4bbb8e
SHA1e8ff48ddc9ceb64a797505f84870e916772118cc
SHA2569757dba0f24b8e776a31dd3ae82b9be3592d32bf1f8e4f1b985d67f884b8249f
SHA512ba26e7ca4c6e7af502ecf88daf82058d4d549466120607a717064804ebfc18c85cbc7fbb6ff2a6443811c2e636c963efab86399e9c22502a2ec7c7dca3c0a412
-
Filesize
92KB
MD5d2b6fd77509489153d410a26288d0426
SHA11fe7f9c892735150b5cac6d652d7fd21970a17ac
SHA256187240ceeaa1f8326ee7b77ab51a8a22ce3da261883c431b53cb8aadd76d6560
SHA5124619ac311b496fd0d264d92b417630036f8878b1c5fa9beb562829c49a42af646428e5dd497c7d62c6fb6d41894be28ffc1804fad02301f7883d618323daee06