Analysis
-
max time kernel
71s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29-12-2023 19:36
Static task
static1
Behavioral task
behavioral1
Sample
01f087e43808d90925ec99ccb7154773.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01f087e43808d90925ec99ccb7154773.exe
Resource
win10v2004-20231215-en
General
-
Target
01f087e43808d90925ec99ccb7154773.exe
-
Size
203KB
-
MD5
01f087e43808d90925ec99ccb7154773
-
SHA1
aa7a69980f2a49ada5bcf162d43bd2b8958fb4b6
-
SHA256
eeb7c4af49e7e5daad96703dd2aa97e5c66cd7b94930ec4ba7cc011ffe8fa0ae
-
SHA512
9305109385bad4338bc6a6dd5a46561c789cac54d9fb42d45ccf3bdb9eebd3bf620e0c6e133f5c1d97d50f46c7f89bb7329c33d3032a5d94fe70f07a31e5102b
-
SSDEEP
6144:838XpOAhmmMKnKrrAoyOWK3dt7bQ0KSRCh8x:COpjnKgkWKtt7ySRCh8
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 01f087e43808d90925ec99ccb7154773.exe -
Loads dropped DLL 2 IoCs
pid Process 4428 01f087e43808d90925ec99ccb7154773.exe 4440 Process not Found -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\autosync.dll 01f087e43808d90925ec99ccb7154773.exe File opened for modification C:\Windows\system32\autosync64.dll 01f087e43808d90925ec99ccb7154773.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 376 4620 WerFault.exe 107 1784 4620 WerFault.exe 107 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4428 01f087e43808d90925ec99ccb7154773.exe 4428 01f087e43808d90925ec99ccb7154773.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4428 wrote to memory of 1072 4428 01f087e43808d90925ec99ccb7154773.exe 101 PID 4428 wrote to memory of 1072 4428 01f087e43808d90925ec99ccb7154773.exe 101 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4404 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\01f087e43808d90925ec99ccb7154773.exe"C:\Users\Admin\AppData\Local\Temp\01f087e43808d90925ec99ccb7154773.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\System32\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Windows\system32\autosync64.dll",CreateProcessNotify2⤵PID:1072
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\240680328.bat" "C:\Users\Admin\AppData\Local\Temp\01f087e43808d90925ec99ccb7154773.exe""2⤵PID:4620
-
C:\Windows\SysWOW64\attrib.exeattrib -s -r -h"C:\Users\Admin\AppData\Local\Temp\01f087e43808d90925ec99ccb7154773.exe"3⤵
- Views/modifies file attributes
PID:4404
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 5243⤵
- Program crash
PID:376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4620 -s 5323⤵
- Program crash
PID:1784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4428 -ip 44281⤵PID:3944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 556 -p 4620 -ip 46201⤵PID:3228
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 480 -p 4620 -ip 46201⤵PID:228
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
97B
MD5d226a657b279c5fc0a892748230a56ff
SHA1fa7e4fb6d6de3c4769001cbfce0a00ba02ef28a5
SHA2569dae2767b8e3499d37418a75ddd04d457c7ec8d6c8f312ee109c95a8a97e7761
SHA51207d55ccf3b511c3be64f6dcd05cea3feaafb286196e5d7ba30016ab6d9c0d656fb7cde8eb1ce0ef28a41f1f3f00f0e29020c92479619fd43e4ed47b829f8bf2a
-
Filesize
68KB
MD5a75036d01acc9d616197f438210f65fd
SHA161c520f525d683c326ec0b9ae965c3ae5461bb06
SHA2563f883c91668d85446f87b0d6162756afdcc5dc77125830bb7b9cd26efa8fdd43
SHA51240e3304a3efa1a273f3313ad7223a0cac27cd18c652e7496cdaf9f88c5da0e62215b4ef865e4dbd2bc884a644a5dbdc13a95e1940f130046dda66a8fc8e3152e
-
Filesize
67KB
MD5aeb605cfc960db2e17656dd67c015552
SHA1e7197d4c49766eb86ad17f8843f728f1ebc09f5a
SHA2561edefbb52c687d79bc0353b244c40aca5becbf66904d4951e136dd7ec5e62494
SHA512b89933b8975f2496ed0d74b758284a874d0d784c3d632cb5de0286d240f9715b09bf9fa8304968799908e4d0c561f8e9c2dfea91652294387e7279a8b7cfe9f1
-
Filesize
28KB
MD5c30f8b99c38add747866e64f08581f92
SHA1d7509022308c44fb65a6e43d191217624bb98bcf
SHA256506ee50c506be8617f6229667960c1616b3083edbb5f1223588e86585e9d9a7f
SHA512609a6990a47984bb3ba6397d852acadddafad7fc55be97ce7f5b1d06df75025f06ba14c1666ea3431c2efe5ae76f761f4adffafcf72b4e85a3f2a45c7f2504af
-
Filesize
74KB
MD50f6ada608f5b44d2ab9985451bf3e7ad
SHA13362a15c6107eb6f54bee7a679653edefc94fbc5
SHA256021669f2daa816dd76882bb89b825a9a31b204499669efb44280c80077b1e7a5
SHA512f62aeaad64904172eb4b637ae00e11d9683722e695290610c2911b77d0aac532fb2d174614950686fae5ad9bd6b4e77a544488709425edcc86992ad298699484