Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 23:37
Static task
static1
Behavioral task
behavioral1
Sample
203ff93650e16e6dd24068006f2400f3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
203ff93650e16e6dd24068006f2400f3.exe
Resource
win10v2004-20231215-en
General
-
Target
203ff93650e16e6dd24068006f2400f3.exe
-
Size
254KB
-
MD5
203ff93650e16e6dd24068006f2400f3
-
SHA1
c9d0cec6e8308ebfce284147884aeb203f79917a
-
SHA256
24b69eed85bbf801496ee49aad6384a1be9fd5ff26dced2896bbcc62eab026b2
-
SHA512
9b969ace3314f576a5fc9a90d83ac4cb51d220e99d53fde2e720188e78434cb85c6dce8c320db935d252a7dc59895c7b42efde25f9560823cb6ae8c1ac03a03c
-
SSDEEP
6144:vk/kPicTTWjeZ4M9z0Iog9+u2rgVrPdbWyPoWv:vksPicXWjCbrHx2rgVrAyPv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 203ff93650e16e6dd24068006f2400f3.exe -
Loads dropped DLL 1 IoCs
pid Process 4964 203ff93650e16e6dd24068006f2400f3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4964 wrote to memory of 4456 4964 203ff93650e16e6dd24068006f2400f3.exe 90 PID 4964 wrote to memory of 4456 4964 203ff93650e16e6dd24068006f2400f3.exe 90 PID 4964 wrote to memory of 4456 4964 203ff93650e16e6dd24068006f2400f3.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\203ff93650e16e6dd24068006f2400f3.exe"C:\Users\Admin\AppData\Local\Temp\203ff93650e16e6dd24068006f2400f3.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\SysWOW64\mshta.exe"C:\Windows\System32\mshta.exe" c:\886352b8-fc04-4b8c-9580-ee987abe79eb\start.hta2⤵PID:4456
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132KB
MD5d6fe8c5bf178d2cfaf0ef2edbde9a007
SHA158ab1efd76e0e63f302a5191c455531f18814d27
SHA256051ee28255251ec62bf6a5f254f781925b6ca5003ea660eea90b5e6d8406b070
SHA512444fba11c4eedb43816a079549689571cc54f8eb20a13d322e1f350f3ddaecd887db5ad692c2506085b898f3b3f639ea36645ce1f319fb360d7ba5bccd8aeea2
-
Filesize
1KB
MD5e88ebd85dd56110ac6ea93fe0922988e
SHA1684a31d864d33ff736234c41ac4e8d2c7f90d5ae
SHA256379d1b0948f8e06366e7bcd197c848c0cc783787792f2224f98c16b974d920eb
SHA512211b0760c9a887fc13c479617daeb6d5b6ee0ccd06c214967abd3e1f14204f72e34a6dd5eb778a9fc6ac7fc8bd63bdef80b347abab97becda16924cb3e164dc7
-
Filesize
1KB
MD5db4ada697fa7a0e215281533d52578e9
SHA1fb755ea8371edf5065dc53e21eb413603f9eba7f
SHA256f949fd6ca734830572128b4348dfd039419140c7ef501d80773f71ca3f0ed78c
SHA5129ba1d2658785dd3c88b4399132f8330dc58872235e19ca9854b0e453d8cc7a58de0c8be84da376a72b5851073f531c95b2c6afa84f43053561ca8e6751d6e2f3