Analysis
-
max time kernel
149s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 08:51
Static task
static1
Behavioral task
behavioral1
Sample
13c3331bb5a71a9f29e4376ae72e06a6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
13c3331bb5a71a9f29e4376ae72e06a6.exe
Resource
win10v2004-20231215-en
General
-
Target
13c3331bb5a71a9f29e4376ae72e06a6.exe
-
Size
140KB
-
MD5
13c3331bb5a71a9f29e4376ae72e06a6
-
SHA1
b114015a6f71c9df721eca390ad645382c8c013a
-
SHA256
c18d083e14ff3d972679f6aec8d81784b0be1e5081e39fade26998c24db4709d
-
SHA512
ab09c5c7f43dd48971de9292590468b9bd841320e4d0a0cc43d6a56110791ab80a73d798d604e653bc55ef3eefe1b4019d78ef5dc392e006b887affde96d39ad
-
SSDEEP
3072:DuCkt9RZxkEYoRbbrMbvT0q8O1cZPzQ7IXMBc+AMP+QfQEhxFyVU7Eo:DWtZxj5wvP6bQ7yMP+DE827Eo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 13c3331bb5a71a9f29e4376ae72e06a6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F9BA1AA9-CAD4-4C14-BDE6-922DFF5F6F38}\dlloadtime = "1704013445" 13c3331bb5a71a9f29e4376ae72e06a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F9BA1AA9-CAD4-4C14-BDE6-922DFF5F6F38}\mac = "76-72-48-1B-32-61" 13c3331bb5a71a9f29e4376ae72e06a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F9BA1AA9-CAD4-4C14-BDE6-922DFF5F6F38}\dlt = "1704013445" 13c3331bb5a71a9f29e4376ae72e06a6.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 13c3331bb5a71a9f29e4376ae72e06a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 13c3331bb5a71a9f29e4376ae72e06a6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 13c3331bb5a71a9f29e4376ae72e06a6.exe Key created \REGISTRY\MACHINE\Software\Classes\WOW6432Node\CLSID\{F9BA1AA9-CAD4-4C14-BDE6-922DFF5F6F38} 13c3331bb5a71a9f29e4376ae72e06a6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3024 wrote to memory of 384 3024 13c3331bb5a71a9f29e4376ae72e06a6.exe 97 PID 3024 wrote to memory of 384 3024 13c3331bb5a71a9f29e4376ae72e06a6.exe 97 PID 3024 wrote to memory of 384 3024 13c3331bb5a71a9f29e4376ae72e06a6.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\13c3331bb5a71a9f29e4376ae72e06a6.exe"C:\Users\Admin\AppData\Local\Temp\13c3331bb5a71a9f29e4376ae72e06a6.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\13C333~1.EXE >> NUL2⤵PID:384
-