Analysis
-
max time kernel
144s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 08:28
Static task
static1
Behavioral task
behavioral1
Sample
136f1cecf1059eb93c0744b2a3f530e5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
136f1cecf1059eb93c0744b2a3f530e5.exe
Resource
win10v2004-20231215-en
General
-
Target
136f1cecf1059eb93c0744b2a3f530e5.exe
-
Size
160KB
-
MD5
136f1cecf1059eb93c0744b2a3f530e5
-
SHA1
84beb7ae17f3464f0d09d58a87774f8659184a6e
-
SHA256
7a89bb49e6e2ac08c647ff2d944dbf4b32e193572135762f67c3c11d40565e8a
-
SHA512
c4fe808f23171b548638071457c11b06130c877eee0a61d07e1e269dc667caeb57e4355555bdf041bd3bd00f1ecadafd949cb1cb43b536acf309bc411d4a27d8
-
SSDEEP
192:Jn+3TKbYsc0s1kaGe1v9EH9utbz+H7/Qb47GERu2poa1eO1j:Jn+3TKMH0s1tGe1v9EHObzp45z1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 136f1cecf1059eb93c0744b2a3f530e5.exe -
Executes dropped EXE 1 IoCs
pid Process 1224 136f1cecf1059eb93c0744b2a3f530e5.exe -
Loads dropped DLL 1 IoCs
pid Process 1224 136f1cecf1059eb93c0744b2a3f530e5.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\hen = "C:\\Windows\\136f1cecf1059eb93c0744b2a3f530e5.exe" 136f1cecf1059eb93c0744b2a3f530e5.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\dl.Dll 136f1cecf1059eb93c0744b2a3f530e5.exe File created C:\Windows\136f1cecf1059eb93c0744b2a3f530e5.exe 136f1cecf1059eb93c0744b2a3f530e5.exe File opened for modification C:\Windows\136f1cecf1059eb93c0744b2a3f530e5.exe 136f1cecf1059eb93c0744b2a3f530e5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1224 136f1cecf1059eb93c0744b2a3f530e5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1224 136f1cecf1059eb93c0744b2a3f530e5.exe 1224 136f1cecf1059eb93c0744b2a3f530e5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3588 wrote to memory of 1224 3588 136f1cecf1059eb93c0744b2a3f530e5.exe 96 PID 3588 wrote to memory of 1224 3588 136f1cecf1059eb93c0744b2a3f530e5.exe 96 PID 3588 wrote to memory of 1224 3588 136f1cecf1059eb93c0744b2a3f530e5.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\136f1cecf1059eb93c0744b2a3f530e5.exe"C:\Users\Admin\AppData\Local\Temp\136f1cecf1059eb93c0744b2a3f530e5.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\136f1cecf1059eb93c0744b2a3f530e5.exe"C:\Windows\136f1cecf1059eb93c0744b2a3f530e5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1224
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5136f1cecf1059eb93c0744b2a3f530e5
SHA184beb7ae17f3464f0d09d58a87774f8659184a6e
SHA2567a89bb49e6e2ac08c647ff2d944dbf4b32e193572135762f67c3c11d40565e8a
SHA512c4fe808f23171b548638071457c11b06130c877eee0a61d07e1e269dc667caeb57e4355555bdf041bd3bd00f1ecadafd949cb1cb43b536acf309bc411d4a27d8
-
Filesize
4KB
MD50047fdc0b06943b5597f0ae06c7c1065
SHA18ae248841e5615d2b3b617d2308b94a5e4489765
SHA2568ace08f9e104a654e38df8a9b3b1331676e5cfa661c6cb995204e3e6865569d1
SHA512e5caa248b704530a6e3af9c189b2c729fcd6f61d88128c5dba57c8a2df133c00ac4792c12efda7d18d88ce74bfea5c72b49319b6733d147a94c55c8e31f79b01