Analysis
-
max time kernel
148s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 11:32
Behavioral task
behavioral1
Sample
173803bc478781463e481e45c025b512.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
173803bc478781463e481e45c025b512.exe
Resource
win10v2004-20231215-en
General
-
Target
173803bc478781463e481e45c025b512.exe
-
Size
21KB
-
MD5
173803bc478781463e481e45c025b512
-
SHA1
00cd0b6a032f9306039a6ec145476bfd499c2279
-
SHA256
e999a9cf2f908e90a6c0669b23c287b969ecac10ba4ebd0a9f4fd804f4237116
-
SHA512
31348a37d8eee97b0f3abdf2d4a8015bf4a2206f4abbfa8707673f65d28b4c8cef19c4d0ca83f26d08180168f83bbca20deaa325e83a075d53bda82c4dc2a239
-
SSDEEP
384:HIiV728hUQ7Y2P/cVEccDdye7kjlWLe7grPiA8jyrMPhTjanbBoZn8QTHLVaNJas:HRGuY2P0Vo6r7SiAwyrMRjbV/HsnbcuE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 173803bc478781463e481e45c025b512.exe -
resource yara_rule behavioral2/memory/4392-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/4392-5-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4392 wrote to memory of 4652 4392 173803bc478781463e481e45c025b512.exe 89 PID 4392 wrote to memory of 4652 4392 173803bc478781463e481e45c025b512.exe 89 PID 4392 wrote to memory of 4652 4392 173803bc478781463e481e45c025b512.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\173803bc478781463e481e45c025b512.exe"C:\Users\Admin\AppData\Local\Temp\173803bc478781463e481e45c025b512.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4055.tmp\setup.bat" "2⤵PID:4652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
578B
MD5d2a572e1ec318b9147c3f6ba7fd17575
SHA1d63a4d25d6d5c9b1023bf17da642d845e4c13c54
SHA2566e6852df07266e0042dc337fe70dd2b799567cfcdb30313257fc6670dd8592df
SHA5125242bbd72909ae358396ee9e8ef12a1ca59720873f20d40af6fb52ba47c575b35cac98f851a85b35409e3915f284cced5d9a0f2a58374de50cf0293d7954918d