Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 13:46
Static task
static1
Behavioral task
behavioral1
Sample
1a7bd3bb85833f8ed51f478e024af1b7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1a7bd3bb85833f8ed51f478e024af1b7.exe
Resource
win10v2004-20231215-en
General
-
Target
1a7bd3bb85833f8ed51f478e024af1b7.exe
-
Size
322KB
-
MD5
1a7bd3bb85833f8ed51f478e024af1b7
-
SHA1
a3003e285ce0f7c04ea142351d581235e75e52aa
-
SHA256
5851bf0214f12c68579c9b333ee5ed37b6ec5a9afebd519bd37aac0c3a25ea40
-
SHA512
994117914190c32a71af59be095ab24569c1896b6dd7768f8247af4831ceb42dacc62e0ee90b09da2412c455f05973ef9d9efcc01cd631596e728d17ef7d583c
-
SSDEEP
6144:Z/FjEVIUAbAoeKqv5ScGaBD00Daf6E36SfVFZDedW7J/h8O7o1r:ZREVI7bk/FVlDaf336SnZDj7php0
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Executes dropped EXE 1 IoCs
pid Process 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "\\System\\System.exe" 1a7bd3bb85833f8ed51f478e024af1b7.exe Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System = "C:\\Users\\Admin\\AppData\\Roaming\\System\\System.exe" 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Windows\assembly\Desktop.ini 1a7bd3bb85833f8ed51f478e024af1b7.exe File opened for modification C:\Windows\assembly\Desktop.ini 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\assembly\Desktop.ini 1a7bd3bb85833f8ed51f478e024af1b7.exe File opened for modification C:\Windows\assembly 1a7bd3bb85833f8ed51f478e024af1b7.exe File created C:\Windows\assembly\Desktop.ini 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1376 PING.EXE -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe Token: SeDebugPrivilege 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe Token: 33 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe Token: SeIncBasePriorityPrivilege 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2092 1a7bd3bb85833f8ed51f478e024af1b7.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2092 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 68 PID 2900 wrote to memory of 2092 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 68 PID 2900 wrote to memory of 2092 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 68 PID 2900 wrote to memory of 452 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 65 PID 2900 wrote to memory of 452 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 65 PID 2900 wrote to memory of 452 2900 1a7bd3bb85833f8ed51f478e024af1b7.exe 65 PID 452 wrote to memory of 1376 452 cmd.exe 67 PID 452 wrote to memory of 1376 452 cmd.exe 67 PID 452 wrote to memory of 1376 452 cmd.exe 67
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7.exe"C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 1000 > Nul & Del "C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:1376
-
-
-
C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7\1a7bd3bb85833f8ed51f478e024af1b7.exe"C:\Users\Admin\AppData\Local\Temp\1a7bd3bb85833f8ed51f478e024af1b7\1a7bd3bb85833f8ed51f478e024af1b7.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops desktop.ini file(s)
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2092
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:3000