Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 00:19
Static task
static1
Behavioral task
behavioral1
Sample
21720697197ad4dde61f63f81c03a10e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
21720697197ad4dde61f63f81c03a10e.exe
Resource
win10v2004-20231215-en
General
-
Target
21720697197ad4dde61f63f81c03a10e.exe
-
Size
1016KB
-
MD5
21720697197ad4dde61f63f81c03a10e
-
SHA1
ddc59b7dff2817440b5333086230ff3fb19487d9
-
SHA256
72809b8aea10c51a671cbc71c14eb406bd8d41901acbe11789c2a4285b8d21d9
-
SHA512
66a5b5f63b6f9b7043a232027333d01f20cee0b85a5d1972e9913daf7efb1b478fa2031467e4458363024ae9c41ca49636c1f5916caec43997c95f9f4d9f12a5
-
SSDEEP
24576:dkVyCdYXwU5mm3K+NV4gBopyvucDDCazjSY:OV5Imm6+NV4gNVP
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 21720697197ad4dde61f63f81c03a10e.exe -
Executes dropped EXE 1 IoCs
pid Process 3300 84523628.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\84523628 = "C:\\ProgramData\\84523628\\84523628.exe" 21720697197ad4dde61f63f81c03a10e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\84523628 = "C:\\PROGRA~3\\84523628\\84523628.exe" 84523628.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3300 84523628.exe -
Suspicious use of FindShellTrayWindow 8 IoCs
pid Process 3300 84523628.exe 3300 84523628.exe 3300 84523628.exe 3300 84523628.exe 3300 84523628.exe 3300 84523628.exe 3300 84523628.exe 3300 84523628.exe -
Suspicious use of SendNotifyMessage 8 IoCs
pid Process 3300 84523628.exe 3300 84523628.exe 3300 84523628.exe 3300 84523628.exe 3300 84523628.exe 3300 84523628.exe 3300 84523628.exe 3300 84523628.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4800 wrote to memory of 3000 4800 21720697197ad4dde61f63f81c03a10e.exe 92 PID 4800 wrote to memory of 3000 4800 21720697197ad4dde61f63f81c03a10e.exe 92 PID 4800 wrote to memory of 3000 4800 21720697197ad4dde61f63f81c03a10e.exe 92 PID 3000 wrote to memory of 4860 3000 cmd.exe 93 PID 3000 wrote to memory of 4860 3000 cmd.exe 93 PID 3000 wrote to memory of 4860 3000 cmd.exe 93 PID 4860 wrote to memory of 3300 4860 cmd.exe 94 PID 4860 wrote to memory of 3300 4860 cmd.exe 94 PID 4860 wrote to memory of 3300 4860 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\21720697197ad4dde61f63f81c03a10e.exe"C:\Users\Admin\AppData\Local\Temp\21720697197ad4dde61f63f81c03a10e.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\84523628\84523628.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\cmd.execmd.exe /c start C:\PROGRA~3\84523628\84523628.exe /inst3⤵
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\PROGRA~3\84523628\84523628.exeC:\PROGRA~3\84523628\84523628.exe /inst4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3300
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
460KB
MD5a898eab4d3892d445901eb53f4166c6f
SHA1eec70e1fb9ec7278ad8f999580558cf9bf62f82b
SHA256e23ae972a6076e9c6c79881c71eb5cd13bd367e791b4f9d29ea3fe93fce9834e
SHA51284921cd9fbaeb94cdc8db1bb2e041b8c426a47500e14de2cc70cf22ea491dd6e3a19127f35f91863ad20cc95ae25a64685a603ee20535ea60c15e6246908f311
-
Filesize
233B
MD517be84d2950e0fdcab1aa609a0f04980
SHA14b26e0da72233d6d0ce831699382b553f3daac07
SHA2567e43dd02722c996ee9af862ff05da0471df8ca4afa999b57d561ba57e1f0bec9
SHA512655b4d0dd80254df051a13d44d43ce592be6f9036ab3c4ab1357ceb877e084830ed462ab109e1cc48d90dbb780ca33c197ed2ee2c0b305d81381a10aa3647e51
-
Filesize
453KB
MD5decbe7b4e61c94d224f52d20ae8f76e2
SHA1343395cdd9f55ddae27995ee83f5bb64852e1e65
SHA256c4ea75a7d0de9bb4f390644b7fea55c75678f417c5070b6d1cf11fc078df7dfb
SHA512fa70959f08149c8b218d7be1364ee881724c4ade49a4b89bdb932f5f2160e71730089a74d328a29c0ed22e4b0072a422c6324389692954f274054574082489ed