Analysis
-
max time kernel
0s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 05:30
Static task
static1
Behavioral task
behavioral1
Sample
10077bfb18a6bba03a4d83181d9284eb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
10077bfb18a6bba03a4d83181d9284eb.exe
Resource
win10v2004-20231215-en
General
-
Target
10077bfb18a6bba03a4d83181d9284eb.exe
-
Size
112KB
-
MD5
10077bfb18a6bba03a4d83181d9284eb
-
SHA1
69f5622a566a441c4d185b795a375102e3c97f26
-
SHA256
612e2a99898cbe03f132fcdfa38bdf87f42f047d2d874849e6ff916844ee409e
-
SHA512
00364f3a11eb0e886f4f39bffecb2545a8c766a050d0cacc89c7e1c8d25fcb96ab305e92af0e49cbe19b6805077af1e5420c8718ece18819dcf992ce0b0d521b
-
SSDEEP
1536:VCqlZmQNc6BJBrkqY3QjlpFvKwxqsQHpuRsjorJEbsVCCvr70a3/Hdep:KMc4a3ah5CNcJw0xbvH
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\run 10077bfb18a6bba03a4d83181d9284eb.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\fy = "C:\\SysFy2\\svchost.exe" 10077bfb18a6bba03a4d83181d9284eb.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 10077bfb18a6bba03a4d83181d9284eb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 10077bfb18a6bba03a4d83181d9284eb.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\10077bfb18a6bba03a4d83181d9284eb.exe"C:\Users\Admin\AppData\Local\Temp\10077bfb18a6bba03a4d83181d9284eb.exe"1⤵
- Adds policy Run key to start application
- Checks computer location settings
- Modifies registry class
PID:828 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\SysFy2\del.bat2⤵PID:4352
-
-
C:\SysFy2\svchost.exe"C:\SysFy2\svchost.exe"2⤵PID:3796
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5d99ea551c6b15943aa0e15acd60e4ee3
SHA1dddf4a61b71c6d4d83e26cfce3404d04f93294b8
SHA25678d464af8e42b60151adbcc8de285ca8187d0e249c6cd50c216969b4d9c5722b
SHA5125d2c2ec90117f8e63b77e89f3209a52281deaa7e2cfaeaa191d8a03bdfddc0d6d517c3af8368b62d3b405f67b132914874a038883ecda403d5568dbc9332bf48