Analysis
-
max time kernel
152s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 04:13
Static task
static1
Behavioral task
behavioral1
Sample
27b453ff321dc06e7837fba30cbcd1e3.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
27b453ff321dc06e7837fba30cbcd1e3.exe
Resource
win10v2004-20231215-en
General
-
Target
27b453ff321dc06e7837fba30cbcd1e3.exe
-
Size
18KB
-
MD5
27b453ff321dc06e7837fba30cbcd1e3
-
SHA1
11e08a7ddc59fa47b8158baecc8e63b85d4f5f23
-
SHA256
1e8c6c89f2f0bc6414b19717292dc2ab16e7f60a19a326438857128163f9cbd6
-
SHA512
a2088d0a4ac652da5052d480a2f502ef3671f0b1dd4e363c4753490927640a58f7251f33e84de1cf199238fbff67a03e9dce9ca4e297b018aca590995fac3d8a
-
SSDEEP
384:7TOwsi81JC/27BgvVQK/KXcRY1VDRWK8GulnEuTTtWOeo:psi81s/Oc3KXce1VDRD8DlnEe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 27b453ff321dc06e7837fba30cbcd1e3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\videoPl.chl\CLSID 27b453ff321dc06e7837fba30cbcd1e3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\videoPl.chl 27b453ff321dc06e7837fba30cbcd1e3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\videoPl.chl\CLSID\ = "{6BF52A52-394A-11D3-B153-00C04F79FAA6}" 27b453ff321dc06e7837fba30cbcd1e3.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1260 27b453ff321dc06e7837fba30cbcd1e3.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1260 wrote to memory of 932 1260 27b453ff321dc06e7837fba30cbcd1e3.exe 102 PID 1260 wrote to memory of 932 1260 27b453ff321dc06e7837fba30cbcd1e3.exe 102 PID 1260 wrote to memory of 932 1260 27b453ff321dc06e7837fba30cbcd1e3.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\27b453ff321dc06e7837fba30cbcd1e3.exe"C:\Users\Admin\AppData\Local\Temp\27b453ff321dc06e7837fba30cbcd1e3.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\awer0.bat" "2⤵PID:932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD54aea744ce3afade46ae7e6d87a87e00d
SHA173ab2ee17ca40aacfd94037e81ec821fb7fec6dd
SHA25692665d73e1d2a40536295ae9e0af65b2975004540f0e8dcb93660baf174f83ea
SHA5129db8fd405db122858bfe9465d03346fe8bd9432aec194a941db68188969998f9e6b798fd4fdf1e66df2c521842b18dff1279f2082df30e3ba3b4ab4338dda9e6