Analysis
-
max time kernel
3s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 07:32
Static task
static1
Behavioral task
behavioral1
Sample
123924d685dabccf6e5fb2513a51df6b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
123924d685dabccf6e5fb2513a51df6b.exe
Resource
win10v2004-20231215-en
General
-
Target
123924d685dabccf6e5fb2513a51df6b.exe
-
Size
1.8MB
-
MD5
123924d685dabccf6e5fb2513a51df6b
-
SHA1
53cc385c9af66ebc6c1c9fb4be61378c849a88ad
-
SHA256
b7cc55fd7f8a2f628ce5aa5d9df8e6252bb33d321e80669f43de4a51c7b51fc0
-
SHA512
6b7a046d09f1f11620f16e4db16f566f247dcdf5465eb08aa9c0dd221c0182481e8f74a2280809a1837daf8bd0eecac4e748ea928c0d71c8c1a7fd9f27e985cf
-
SSDEEP
49152:EgEZyN6/pMm1Xcd+gjxu29nx2nNRIxedlyL:uZId4NRNS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 123924d685dabccf6e5fb2513a51df6b.exe -
Executes dropped EXE 1 IoCs
pid Process 2168 explore.exe -
resource yara_rule behavioral2/memory/2168-13-0x0000000000400000-0x0000000000DEA000-memory.dmp upx behavioral2/memory/2168-17-0x0000000000400000-0x0000000000DEA000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\explore.exe 123924d685dabccf6e5fb2513a51df6b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1740 123924d685dabccf6e5fb2513a51df6b.exe 2168 explore.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2168 1740 123924d685dabccf6e5fb2513a51df6b.exe 72 PID 1740 wrote to memory of 2168 1740 123924d685dabccf6e5fb2513a51df6b.exe 72 PID 1740 wrote to memory of 2168 1740 123924d685dabccf6e5fb2513a51df6b.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\123924d685dabccf6e5fb2513a51df6b.exe"C:\Users\Admin\AppData\Local\Temp\123924d685dabccf6e5fb2513a51df6b.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\explore.exe"C:\Windows\explore.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2168
-