Analysis
-
max time kernel
143s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 11:04
Static task
static1
Behavioral task
behavioral1
Sample
16b1cd32e9575e3f1c1d664d07fd6056.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
16b1cd32e9575e3f1c1d664d07fd6056.exe
Resource
win10v2004-20231222-en
General
-
Target
16b1cd32e9575e3f1c1d664d07fd6056.exe
-
Size
163KB
-
MD5
16b1cd32e9575e3f1c1d664d07fd6056
-
SHA1
1ef1b9180ed3e3e7feb8d520cb3c0587883fefa2
-
SHA256
53a9c3a6f8a799c8693f3c186a70a16b27dfab478ac760d11708f62df7076282
-
SHA512
dd05602c6f7cc545cf4ce93cd23c62c36a086c049030482dfc55ac2dbe65a2d0cdc25b2e12e15b66a803d8931ac3e074a48e3e572d9c240b6a74075e10639948
-
SSDEEP
1536:QrxobpgNDOknApFd9FIKUSDAdwjnucYAz67OxfNP4JAG9Ir09wQRRB3ESciKeEeP:sgpgFOdpFd9iKhDquu4zvxfZIwm5US
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 16b1cd32e9575e3f1c1d664d07fd6056.exe -
Executes dropped EXE 1 IoCs
pid Process 3384 vshost32.exe -
Loads dropped DLL 2 IoCs
pid Process 3384 vshost32.exe 3384 vshost32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ScdBcd = "C:\\Users\\Admin\\AppData\\Roaming\\Dibifu_9\\vshost32.exe" vshost32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3968 wrote to memory of 3384 3968 16b1cd32e9575e3f1c1d664d07fd6056.exe 42 PID 3968 wrote to memory of 3384 3968 16b1cd32e9575e3f1c1d664d07fd6056.exe 42 PID 3968 wrote to memory of 3384 3968 16b1cd32e9575e3f1c1d664d07fd6056.exe 42 PID 3968 wrote to memory of 4064 3968 16b1cd32e9575e3f1c1d664d07fd6056.exe 39 PID 3968 wrote to memory of 4064 3968 16b1cd32e9575e3f1c1d664d07fd6056.exe 39 PID 3968 wrote to memory of 4064 3968 16b1cd32e9575e3f1c1d664d07fd6056.exe 39 PID 4064 wrote to memory of 3708 4064 cmd.exe 40 PID 4064 wrote to memory of 3708 4064 cmd.exe 40 PID 4064 wrote to memory of 3708 4064 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\16b1cd32e9575e3f1c1d664d07fd6056.exe"C:\Users\Admin\AppData\Local\Temp\16b1cd32e9575e3f1c1d664d07fd6056.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del C:\Users\Admin\AppData\Local\Temp\16b1cd32e9575e3f1c1d664d07fd6056.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\choice.exechoice /C Y /N /D Y /T 33⤵PID:3708
-
-
-
C:\Users\Admin\AppData\Roaming\Dibifu_9\vshost32.exe"C:\Users\Admin\AppData\Roaming\Dibifu_9\vshost32.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:3384
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5a21a157e7f27cb80cdd82cdb02dc2da6
SHA190a8a42d7356f06b1c144e657071461ddb224752
SHA25635ba8730dd874fca3c0348bb38f972c099dbc7ba0f1c9b748dcfebdde1b0004e
SHA512c4c68a9fa6f130526a0a0ec010d92dae38b81aebcf0fa3256b561987aa7b26e98b69bbc2acad4bafdc29ee2e6f714d81583baac2e28a8a25f62045ad84dba2a5