Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 18:30
Static task
static1
Behavioral task
behavioral1
Sample
0083b07dba712fd09d10ea70c3eb5491.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0083b07dba712fd09d10ea70c3eb5491.exe
Resource
win10v2004-20231215-en
General
-
Target
0083b07dba712fd09d10ea70c3eb5491.exe
-
Size
536KB
-
MD5
0083b07dba712fd09d10ea70c3eb5491
-
SHA1
b18251868a1afba068b4462e452a7ec424f614ab
-
SHA256
2643b5d2aa78a1784f5d59bb71e00283af5bc81f4ff7c14b5d3532bffcf03221
-
SHA512
368de9e2179c3ae7ed12b197ca32500c89c59cb37dd824cedd9115e7dcf1b04c2ff70e296ba81038d1eca0eb68aa5b2029a9196f502cef9c1ddeede3ab066b3f
-
SSDEEP
12288:6MMnMMMMMUQEXhRgxrdXtzGcApWZehcZ4UScVQ2pt:6MMnMMMMMnSh+xfaVpWZScocVQ2pt
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 0083b07dba712fd09d10ea70c3eb5491.exe -
Executes dropped EXE 1 IoCs
pid Process 428 BOxnsLJoBqtiUfF.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\BOxnsLJoBqtiUfF = "C:\\ProgramData\\BOxnsLJoBqtiUfF.exe" 0083b07dba712fd09d10ea70c3eb5491.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Internet Explorer\Download 0083b07dba712fd09d10ea70c3eb5491.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 0083b07dba712fd09d10ea70c3eb5491.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3680 0083b07dba712fd09d10ea70c3eb5491.exe 3680 0083b07dba712fd09d10ea70c3eb5491.exe 3680 0083b07dba712fd09d10ea70c3eb5491.exe 3680 0083b07dba712fd09d10ea70c3eb5491.exe 428 BOxnsLJoBqtiUfF.exe 428 BOxnsLJoBqtiUfF.exe 428 BOxnsLJoBqtiUfF.exe 428 BOxnsLJoBqtiUfF.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3680 0083b07dba712fd09d10ea70c3eb5491.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3680 wrote to memory of 428 3680 0083b07dba712fd09d10ea70c3eb5491.exe 24 PID 3680 wrote to memory of 428 3680 0083b07dba712fd09d10ea70c3eb5491.exe 24 PID 3680 wrote to memory of 428 3680 0083b07dba712fd09d10ea70c3eb5491.exe 24 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 0083b07dba712fd09d10ea70c3eb5491.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 0083b07dba712fd09d10ea70c3eb5491.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0083b07dba712fd09d10ea70c3eb5491.exe"C:\Users\Admin\AppData\Local\Temp\0083b07dba712fd09d10ea70c3eb5491.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3680 -
C:\ProgramData\BOxnsLJoBqtiUfF.exe"C:\ProgramData\BOxnsLJoBqtiUfF.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:428
-