Analysis
-
max time kernel
142s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 03:28
Static task
static1
Behavioral task
behavioral1
Sample
2660b565e3a3d877f679babf4458280b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2660b565e3a3d877f679babf4458280b.exe
Resource
win10v2004-20231215-en
General
-
Target
2660b565e3a3d877f679babf4458280b.exe
-
Size
48KB
-
MD5
2660b565e3a3d877f679babf4458280b
-
SHA1
0785bc612744867237be918a9f8f4208c668db16
-
SHA256
71deb1ac50741670f954e3f3e98938e351b64176791f854806c2ad2792653dac
-
SHA512
0264b8fcb7d24603441d87fb3768f3f4e4852af985dc686332690c19986e6a44db6705f7e2c0f6e639fcee28d98aaa85c67b5fb0e2562190d92820250d71f496
-
SSDEEP
768:7JToSJxKrAw0cWtyNFJMQpibIGc9x+pH2og:5oWoFJMctuMog
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 2660b565e3a3d877f679babf4458280b.exe -
Deletes itself 1 IoCs
pid Process 3956 rund1132.exe -
Executes dropped EXE 1 IoCs
pid Process 3956 rund1132.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\sys001 = "C:\\Windows\\rund1132.exe" 2660b565e3a3d877f679babf4458280b.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\rund1132.exe 2660b565e3a3d877f679babf4458280b.exe File opened for modification C:\Windows\rund1132.exe 2660b565e3a3d877f679babf4458280b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1824 wrote to memory of 3956 1824 2660b565e3a3d877f679babf4458280b.exe 20 PID 1824 wrote to memory of 3956 1824 2660b565e3a3d877f679babf4458280b.exe 20 PID 1824 wrote to memory of 3956 1824 2660b565e3a3d877f679babf4458280b.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\2660b565e3a3d877f679babf4458280b.exe"C:\Users\Admin\AppData\Local\Temp\2660b565e3a3d877f679babf4458280b.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\rund1132.exe"C:\Windows\rund1132.exe" delete C:\Users\Admin\AppData\Local\Temp\2660b565e3a3d877f679babf4458280b.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:3956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD52660b565e3a3d877f679babf4458280b
SHA10785bc612744867237be918a9f8f4208c668db16
SHA25671deb1ac50741670f954e3f3e98938e351b64176791f854806c2ad2792653dac
SHA5120264b8fcb7d24603441d87fb3768f3f4e4852af985dc686332690c19986e6a44db6705f7e2c0f6e639fcee28d98aaa85c67b5fb0e2562190d92820250d71f496