Analysis
-
max time kernel
28s -
max time network
174s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 04:51
Static task
static1
Behavioral task
behavioral1
Sample
0f1ada39fbf13586539cf691c34e5a8e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0f1ada39fbf13586539cf691c34e5a8e.exe
Resource
win10v2004-20231215-en
General
-
Target
0f1ada39fbf13586539cf691c34e5a8e.exe
-
Size
836KB
-
MD5
0f1ada39fbf13586539cf691c34e5a8e
-
SHA1
340aa85a724eca387d5e76f9868033adcc018cec
-
SHA256
57ebe41c389dc6cdd973274d6bba8289b3269bdb52ee9013ad2c9bb98ae7dc2f
-
SHA512
73854731841c9ca502f1e6347d7d8074c91fe2414817a3f01f3d1a520ddc4c2501bbda82e8e6708312371fef6f41a72ada74b96f0511baacfab4feae3d6c6a8e
-
SSDEEP
24576:lXTvLi9yj9BLsuOrfssfrnD1I1YYNb1oLf:BTrLLsuOTvrD1IWwCLf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 0f1ada39fbf13586539cf691c34e5a8e.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 0f1ada39fbf13586539cf691c34e5a8e.exe -
Executes dropped EXE 2 IoCs
pid Process 668 unzip.exe 668 unzip.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\22\52C64B7E\@%SystemRoot%\system32\hnetcfgclient.dll,-201 = "HNetCfg Client" svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3044 0f1ada39fbf13586539cf691c34e5a8e.exe 3044 0f1ada39fbf13586539cf691c34e5a8e.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3044 wrote to memory of 4812 3044 0f1ada39fbf13586539cf691c34e5a8e.exe 90 PID 3044 wrote to memory of 4812 3044 0f1ada39fbf13586539cf691c34e5a8e.exe 90 PID 4812 wrote to memory of 668 4812 cmd.exe 92 PID 4812 wrote to memory of 668 4812 cmd.exe 92 PID 4812 wrote to memory of 668 4812 cmd.exe 92 PID 3044 wrote to memory of 4812 3044 0f1ada39fbf13586539cf691c34e5a8e.exe 187 PID 3044 wrote to memory of 4812 3044 0f1ada39fbf13586539cf691c34e5a8e.exe 187 PID 4812 wrote to memory of 668 4812 cmd.exe 189 PID 4812 wrote to memory of 668 4812 cmd.exe 189 PID 4812 wrote to memory of 668 4812 cmd.exe 189
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f1ada39fbf13586539cf691c34e5a8e.exe"C:\Users\Admin\AppData\Local\Temp\0f1ada39fbf13586539cf691c34e5a8e.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:/Users/Public/Downloads/unzip.exe -o -P Server8888 C:/Users/Public/Downloads/Server.dat -d C:/Users/Public/Downloads2⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Public\Downloads\unzip.exeC:/Users/Public/Downloads/unzip.exe -o -P Server8888 C:/Users/Public/Downloads/Server.dat -d C:/Users/Public/Downloads3⤵
- Executes dropped EXE
PID:668
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
PID:1808
-
C:\Users\Admin\AppData\Local\Temp\0f1ada39fbf13586539cf691c34e5a8e.exe"C:\Users\Admin\AppData\Local\Temp\0f1ada39fbf13586539cf691c34e5a8e.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:/Users/Public/Downloads/unzip.exe -o -P Server8888 C:/Users/Public/Downloads/Server.dat -d C:/Users/Public/Downloads2⤵
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Public\Downloads\unzip.exeC:/Users/Public/Downloads/unzip.exe -o -P Server8888 C:/Users/Public/Downloads/Server.dat -d C:/Users/Public/Downloads3⤵
- Executes dropped EXE
PID:668
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s Netman1⤵
- Modifies data under HKEY_USERS
PID:1808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD5f1a9334ea3cd1cafe1f34d74dcaebe59
SHA1293b8cfbfcf7607f8ea0eb9aed81e467d0ddc1b2
SHA25661ec91b2dbb2644c1d24b15e32a4a65995cea98b15abe7776ed86d75aba424aa
SHA5126546c1a6453335563c157321a103b226ae04b215f44103ddabd3a5aed400d8dfa3dc91eb4691e29f064a2c55b773692461354cb7f5ac90e8e94523c7dc0c58ce
-
Filesize
164KB
MD575375c22c72f1beb76bea39c22a1ed68
SHA1e1652b058195db3f5f754b7ab430652ae04a50b8
SHA2568d9b5190aace52a1db1ac73a65ee9999c329157c8e88f61a772433323d6b7a4a
SHA5121b396e78e189185eefb8c6058aa7e6dfe1b8f2dff8babfe4ffbee93805467bf45760eea6efb8d9bb2040d0eaa56841d457b1976dcfe13ed67931ade01419f55a