Analysis
-
max time kernel
22s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 20:21
Static task
static1
Behavioral task
behavioral1
Sample
02ebea33d1795ce5b377efa7ca5b2f9b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
02ebea33d1795ce5b377efa7ca5b2f9b.exe
Resource
win10v2004-20231215-en
General
-
Target
02ebea33d1795ce5b377efa7ca5b2f9b.exe
-
Size
520KB
-
MD5
02ebea33d1795ce5b377efa7ca5b2f9b
-
SHA1
8d803dc5909ddba9318cca58d7e190aaf5b1cf56
-
SHA256
e76ea96b4de05d951714814b1398f2bcea7ce0423fbd6683727bba5177902a9c
-
SHA512
084c6c3c0e7ca79c340ceb7198ae8ae2213db53babee8c77d57b75d0a874e5a24387e2487613e75c48f8788fdaa0d8b52e4625592e3eabb926160314c09ce2ed
-
SSDEEP
12288:jbCrX64ywpfYXatwHdLf2XKEkunFP6g5a:jGj6RFqmH9+XK3uN6g5a
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 02ebea33d1795ce5b377efa7ca5b2f9b.exe Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation Sd.exe -
Executes dropped EXE 4 IoCs
pid Process 1744 Welcome.exe 2520 7za.exe 4464 Sd.exe 836 GD1.exe -
Loads dropped DLL 1 IoCs
pid Process 2900 02ebea33d1795ce5b377efa7ca5b2f9b.exe -
resource yara_rule behavioral2/memory/4464-30-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4464-42-0x0000000000400000-0x0000000000430000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Google = "C:\\Users\\Admin\\AppData\\Roaming\\GD1.exe " GD1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 836 GD1.exe 836 GD1.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2900 wrote to memory of 1744 2900 02ebea33d1795ce5b377efa7ca5b2f9b.exe 28 PID 2900 wrote to memory of 1744 2900 02ebea33d1795ce5b377efa7ca5b2f9b.exe 28 PID 2900 wrote to memory of 1744 2900 02ebea33d1795ce5b377efa7ca5b2f9b.exe 28 PID 2900 wrote to memory of 2520 2900 02ebea33d1795ce5b377efa7ca5b2f9b.exe 25 PID 2900 wrote to memory of 2520 2900 02ebea33d1795ce5b377efa7ca5b2f9b.exe 25 PID 2900 wrote to memory of 2520 2900 02ebea33d1795ce5b377efa7ca5b2f9b.exe 25 PID 2900 wrote to memory of 4464 2900 02ebea33d1795ce5b377efa7ca5b2f9b.exe 27 PID 2900 wrote to memory of 4464 2900 02ebea33d1795ce5b377efa7ca5b2f9b.exe 27 PID 2900 wrote to memory of 4464 2900 02ebea33d1795ce5b377efa7ca5b2f9b.exe 27 PID 4464 wrote to memory of 836 4464 Sd.exe 26 PID 4464 wrote to memory of 836 4464 Sd.exe 26 PID 4464 wrote to memory of 836 4464 Sd.exe 26
Processes
-
C:\Users\Admin\AppData\Local\Temp\02ebea33d1795ce5b377efa7ca5b2f9b.exe"C:\Users\Admin\AppData\Local\Temp\02ebea33d1795ce5b377efa7ca5b2f9b.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\7za.exe"C:\Users\Admin\AppData\Local\Temp\7za.exe" x "C:\Users\Admin\AppData\Local\Temp\a1.7z" -aoa -oC:\Users\Admin\AppData\Local\Temp -p~@S23js@@vBz99432@t9 "" ""2⤵
- Executes dropped EXE
PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\Sd.exe"C:\Users\Admin\AppData\Local\Temp\Sd.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4464
-
-
C:\Users\Admin\AppData\Roaming\Welcome.exe"C:\Users\Admin\AppData\Roaming\Welcome.exe"2⤵
- Executes dropped EXE
PID:1744
-
-
C:\Users\Admin\AppData\Roaming\GD1.exe"C:\Users\Admin\AppData\Roaming\GD1.exe"1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:836