Analysis
-
max time kernel
1s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 01:02
Static task
static1
Behavioral task
behavioral1
Sample
0967209acb6af811572b6576a90abd19.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0967209acb6af811572b6576a90abd19.exe
Resource
win10v2004-20231215-en
General
-
Target
0967209acb6af811572b6576a90abd19.exe
-
Size
3.1MB
-
MD5
0967209acb6af811572b6576a90abd19
-
SHA1
a5385c87600986a612a03d26ea1e9ff37ffdcc31
-
SHA256
e72d1282f30fed67d34ed0eb66169c20d3744ab2d2bc1361d178412a8801da60
-
SHA512
208d5740902ba0ee1afdfee46d1445fc2edd0579d2c0e50a742121fee0b10a174ed3e32f7ddf9f6239a3398d1adc154015eaf56da2a174f3d4a2fd9cac7c6a46
-
SSDEEP
98304:T6YGnLzxmAf4GxIAfxmYPirQZRLzxmAf4GxIAfxmYPG:TCxmAf4vAOr2xxmAf4vAK
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 0967209acb6af811572b6576a90abd19.exe -
Executes dropped EXE 5 IoCs
pid Process 2460 CMD.exe 1916 firedaemon.exe 3208 FireDaemon.EXE 740 Winnet.exe 2828 Winnet.exe -
Loads dropped DLL 2 IoCs
pid Process 2828 Winnet.exe 740 Winnet.exe -
resource yara_rule behavioral2/memory/740-29-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-49-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/740-47-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/2828-46-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-45-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-56-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-54-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-58-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-60-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-64-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-62-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-68-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-66-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-70-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-72-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-76-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-74-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-80-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-78-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-84-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-82-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-88-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-86-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-90-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-92-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-96-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-94-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-98-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-100-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-102-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-104-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/1824-106-0x0000000000400000-0x0000000000459000-memory.dmp upx behavioral2/memory/5104-108-0x0000000000400000-0x0000000000459000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process 3356 3208 WerFault.exe -
Modifies data under HKEY_USERS 9 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE Winnet.exe Key created \REGISTRY\USER\.DEFAULT\Software\Cygnus Solutions\Cygwin Winnet.exe Key created \REGISTRY\USER\.DEFAULT\Software\Cygnus Solutions\Cygwin\Program Options Winnet.exe Key created \REGISTRY\USER\.DEFAULT\Software\Cygnus Solutions\Cygwin\Program Options Winnet.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE Winnet.exe Key created \REGISTRY\USER\.DEFAULT\Software\Cygnus Solutions\Cygwin\mounts v2 Winnet.exe Key created \REGISTRY\USER\.DEFAULT\Software\Cygnus Solutions Winnet.exe Key created \REGISTRY\USER\.DEFAULT\Software\Cygnus Solutions Winnet.exe Key created \REGISTRY\USER\.DEFAULT\Software\Cygnus Solutions\Cygwin Winnet.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4812 wrote to memory of 2460 4812 0967209acb6af811572b6576a90abd19.exe 44 PID 4812 wrote to memory of 2460 4812 0967209acb6af811572b6576a90abd19.exe 44 PID 4812 wrote to memory of 2460 4812 0967209acb6af811572b6576a90abd19.exe 44 PID 2460 wrote to memory of 1916 2460 CMD.exe 42 PID 2460 wrote to memory of 1916 2460 CMD.exe 42 PID 2460 wrote to memory of 1916 2460 CMD.exe 42 PID 4812 wrote to memory of 2312 4812 0967209acb6af811572b6576a90abd19.exe 27 PID 4812 wrote to memory of 2312 4812 0967209acb6af811572b6576a90abd19.exe 27 PID 4812 wrote to memory of 2312 4812 0967209acb6af811572b6576a90abd19.exe 27 PID 2312 wrote to memory of 3720 2312 net.exe 39 PID 2312 wrote to memory of 3720 2312 net.exe 39 PID 2312 wrote to memory of 3720 2312 net.exe 39 PID 3208 wrote to memory of 740 3208 FireDaemon.EXE 37 PID 3208 wrote to memory of 740 3208 FireDaemon.EXE 37 PID 3208 wrote to memory of 740 3208 FireDaemon.EXE 37 PID 3208 wrote to memory of 2828 3208 FireDaemon.EXE 34 PID 3208 wrote to memory of 2828 3208 FireDaemon.EXE 34 PID 3208 wrote to memory of 2828 3208 FireDaemon.EXE 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0967209acb6af811572b6576a90abd19.exe"C:\Users\Admin\AppData\Local\Temp\0967209acb6af811572b6576a90abd19.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" start winnet2⤵
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start winnet3⤵PID:3720
-
-
-
C:\Users\Admin\AppData\Local\Temp\CMD.exe"C:\Users\Admin\AppData\Local\Temp\CMD.exe" /C SET MXHOME=%cd%&SET MXBIN=%cd%&firedaemon -i winnet "%cd%" "%cd%\Winnet.exe" "Winnet.dll" Y 0 0 N Y>>debug.txt2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3208 -s 3761⤵
- Program crash
PID:3356
-
C:\Users\Admin\AppData\Local\Temp\Winnet.exeC:\Users\Admin\AppData\Local\Temp\Winnet.exe1⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\Winnet.exeC:\Users\Admin\AppData\Local\Temp\Winnet.exe1⤵PID:1824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3208 -ip 32081⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\Winnet.exeC:\Users\Admin\AppData\Local\Temp\Winnet.exe Winnet.dll1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:2828
-
C:\Users\Admin\AppData\Local\Temp\Winnet.exeC:\Users\Admin\AppData\Local\Temp\Winnet.exe Winnet.dll1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:740
-
C:\Users\Admin\AppData\Local\Temp\FireDaemon.EXEC:\Users\Admin\AppData\Local\Temp\FireDaemon.EXE1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208
-
C:\Users\Admin\AppData\Local\Temp\firedaemon.exefiredaemon -i winnet "C:\Users\Admin\AppData\Local\Temp" "C:\Users\Admin\AppData\Local\Temp\Winnet.exe" "Winnet.dll" Y 0 0 N Y1⤵
- Executes dropped EXE
PID:1916