Analysis
-
max time kernel
147s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 22:06
Behavioral task
behavioral1
Sample
1df8ecd94b5721a28f8b7635da46ad0e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1df8ecd94b5721a28f8b7635da46ad0e.exe
Resource
win10v2004-20231215-en
General
-
Target
1df8ecd94b5721a28f8b7635da46ad0e.exe
-
Size
9KB
-
MD5
1df8ecd94b5721a28f8b7635da46ad0e
-
SHA1
2710fcb134722668b90380c23847f1768fbfa4d9
-
SHA256
9de85184927cb1192999e987cb750ace31fdb79fd467a730794ca930777ed187
-
SHA512
e899447aec1e4850a7652b4a7dfa959134d649ad916437999e4f48b16afc70597869e3a93dcfe70a7578c892e9af08ee38388e09e312d5a18c0c290086d691a4
-
SSDEEP
192:L3ADaFjOr2FNsVp1kc1JdYbwpWtqdpxbTMvQFs4:LQDVy0MctdSqP18QFl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 1df8ecd94b5721a28f8b7635da46ad0e.exe -
resource yara_rule behavioral2/memory/1460-0-0x0000000000400000-0x000000000040A000-memory.dmp upx behavioral2/memory/1460-1-0x0000000000400000-0x000000000040A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\videoPl.chl\CLSID 1df8ecd94b5721a28f8b7635da46ad0e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\videoPl.chl 1df8ecd94b5721a28f8b7635da46ad0e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\videoPl.chl\CLSID\ = "{6BF52A52-394A-11D3-B153-00C04F79FAA6}" 1df8ecd94b5721a28f8b7635da46ad0e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1460 wrote to memory of 3408 1460 1df8ecd94b5721a28f8b7635da46ad0e.exe 101 PID 1460 wrote to memory of 3408 1460 1df8ecd94b5721a28f8b7635da46ad0e.exe 101 PID 1460 wrote to memory of 3408 1460 1df8ecd94b5721a28f8b7635da46ad0e.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\1df8ecd94b5721a28f8b7635da46ad0e.exe"C:\Users\Admin\AppData\Local\Temp\1df8ecd94b5721a28f8b7635da46ad0e.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\awer0.bat" "2⤵PID:3408
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD5f7a80b7afd523473b614f07e0db5814b
SHA197a0068efb86c66e7b5c0d3997fbc894ec11779e
SHA2565f16275d691c577e8164a8f1ccae555a150773db3cad0a600aa418fedfe08504
SHA5122ed1fbe9c329ac26363a96ed6ee5b40e2d0fcc02667dfd683322ffe95be879e4d5113cbf79ae72cba6e5be9687511f04181bb94efe449fa30d61cc458691c48e