Analysis
-
max time kernel
146s -
max time network
169s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 23:51
Static task
static1
Behavioral task
behavioral1
Sample
3b61c6148a20523407cd041e5cdfd3fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b61c6148a20523407cd041e5cdfd3fe.exe
Resource
win10v2004-20231215-en
General
-
Target
3b61c6148a20523407cd041e5cdfd3fe.exe
-
Size
15KB
-
MD5
3b61c6148a20523407cd041e5cdfd3fe
-
SHA1
330c7857e71df97d2af1bb9e586ed71546b950de
-
SHA256
8f462891f26da45b62e3abed171de3f157ed6c5a49fa38b03675514e89e65893
-
SHA512
ad3ff64e7a855f94ff6e834b628e7a918ea5c57f6a1255854f7b301c1f1258d2e62c1b25d3f3853c30fb35fbe02c5be2bf95414acd7ac2afeddac29ea781f984
-
SSDEEP
384:NOVFtSF0Aionwq7+pFNZIOc3NeJQaU5OA6ImwDsvoV5LiXWlfxnD:N8MKo5QAF5UImwDsvi5L/D
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 3b61c6148a20523407cd041e5cdfd3fe.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3808 3b61c6148a20523407cd041e5cdfd3fe.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3808 wrote to memory of 1332 3808 3b61c6148a20523407cd041e5cdfd3fe.exe 95 PID 3808 wrote to memory of 1332 3808 3b61c6148a20523407cd041e5cdfd3fe.exe 95 PID 3808 wrote to memory of 1332 3808 3b61c6148a20523407cd041e5cdfd3fe.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b61c6148a20523407cd041e5cdfd3fe.exe"C:\Users\Admin\AppData\Local\Temp\3b61c6148a20523407cd041e5cdfd3fe.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\3B61C6~1.EXE > nul2⤵PID:1332
-