Analysis
-
max time kernel
159s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 01:52
Static task
static1
Behavioral task
behavioral1
Sample
0ac0333c158c6d19018fcba5c53ebede.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ac0333c158c6d19018fcba5c53ebede.exe
Resource
win10v2004-20231215-en
General
-
Target
0ac0333c158c6d19018fcba5c53ebede.exe
-
Size
16KB
-
MD5
0ac0333c158c6d19018fcba5c53ebede
-
SHA1
5c978a69ee262d6b3832771d266b87d70ec6df8c
-
SHA256
cab484ddb2388b4a9fb1af5eaaaff1a178bd0ece25d1ff9892b88f2b567ddacb
-
SHA512
39c60d555d17556f77aad0d6c63d107f19b466e11307dad85d6946ffe797eae5fc0df24f6aac36f605b280d385dacfded71446ae21afc74d976505f3bf2ee482
-
SSDEEP
384:kQ5Ira73w/p8uTbia4GjibK5igtBR0xXbKae4oN8aJZLB:Dyubw/p8qia4Gj5Vtv0xXbAtr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 0ac0333c158c6d19018fcba5c53ebede.exe -
Executes dropped EXE 1 IoCs
pid Process 2752 iu.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Information Update = "C:\\Program Files (x86)\\Information Update\\iu.exe" iu.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Information Update\iu.exe 0ac0333c158c6d19018fcba5c53ebede.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4660 wrote to memory of 2752 4660 0ac0333c158c6d19018fcba5c53ebede.exe 96 PID 4660 wrote to memory of 2752 4660 0ac0333c158c6d19018fcba5c53ebede.exe 96 PID 4660 wrote to memory of 2752 4660 0ac0333c158c6d19018fcba5c53ebede.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ac0333c158c6d19018fcba5c53ebede.exe"C:\Users\Admin\AppData\Local\Temp\0ac0333c158c6d19018fcba5c53ebede.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Program Files (x86)\Information Update\iu.exe"C:\Program Files (x86)\Information Update\iu.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD50ac0333c158c6d19018fcba5c53ebede
SHA15c978a69ee262d6b3832771d266b87d70ec6df8c
SHA256cab484ddb2388b4a9fb1af5eaaaff1a178bd0ece25d1ff9892b88f2b567ddacb
SHA51239c60d555d17556f77aad0d6c63d107f19b466e11307dad85d6946ffe797eae5fc0df24f6aac36f605b280d385dacfded71446ae21afc74d976505f3bf2ee482