Analysis
-
max time kernel
165s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 13:36
Static task
static1
Behavioral task
behavioral1
Sample
38454c27a3c8fc048aff87627514b2ef.exe
Resource
win7-20231215-en
General
-
Target
38454c27a3c8fc048aff87627514b2ef.exe
-
Size
2.0MB
-
MD5
38454c27a3c8fc048aff87627514b2ef
-
SHA1
50ef637c237cc888734c9867d395c83d32d4bc5b
-
SHA256
71f8557e598ab77112e5a7f42db238a5b1117bdd50d195bab4b91b499c1358db
-
SHA512
5b5ffde003f0376505ac1faec60943b1a5a66690e4ec251e86b4926c633fb6fd4f892cff23e037b5412970f96bbd60aac7971b9c280ccc6cb0482341397cd320
-
SSDEEP
49152:2UO5XqloWiZGuTBnak2o5RMfjsTXDRm0a/sVdrhb1FCl+vzXi9V7Y:vuKoWiZGuTokR5RMek9/srr1n+Y
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 38454c27a3c8fc048aff87627514b2ef.exe -
Executes dropped EXE 3 IoCs
pid Process 4592 mirc702.exe 4556 new.exe 2308 mirc702.exe -
Loads dropped DLL 8 IoCs
pid Process 2308 mirc702.exe 2308 mirc702.exe 2308 mirc702.exe 2308 mirc702.exe 2308 mirc702.exe 2308 mirc702.exe 2308 mirc702.exe 2308 mirc702.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA mirc702.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
NSIS installer 4 IoCs
resource yara_rule behavioral2/files/0x000600000001e0ce-5.dat nsis_installer_1 behavioral2/files/0x000600000001e0ce-5.dat nsis_installer_2 behavioral2/files/0x000400000001e7e3-24.dat nsis_installer_1 behavioral2/files/0x000400000001e7e3-24.dat nsis_installer_2 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1064 wrote to memory of 4592 1064 38454c27a3c8fc048aff87627514b2ef.exe 93 PID 1064 wrote to memory of 4592 1064 38454c27a3c8fc048aff87627514b2ef.exe 93 PID 1064 wrote to memory of 4592 1064 38454c27a3c8fc048aff87627514b2ef.exe 93 PID 1064 wrote to memory of 4556 1064 38454c27a3c8fc048aff87627514b2ef.exe 94 PID 1064 wrote to memory of 4556 1064 38454c27a3c8fc048aff87627514b2ef.exe 94 PID 1064 wrote to memory of 4556 1064 38454c27a3c8fc048aff87627514b2ef.exe 94 PID 4592 wrote to memory of 2308 4592 mirc702.exe 95 PID 4592 wrote to memory of 2308 4592 mirc702.exe 95 PID 4592 wrote to memory of 2308 4592 mirc702.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\38454c27a3c8fc048aff87627514b2ef.exe"C:\Users\Admin\AppData\Local\Temp\38454c27a3c8fc048aff87627514b2ef.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\mirc702.exe"C:\Users\Admin\AppData\Local\mirc702.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\mirc702.exe"C:\Users\Admin\AppData\Local\Temp\mirc702.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
PID:2308
-
-
-
C:\Users\Admin\AppData\Local\new.exe"C:\Users\Admin\AppData\Local\new.exe"2⤵
- Executes dropped EXE
PID:4556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD5952a3a92cb412e9674d4ea5c8d81e1da
SHA1297d3f53ac26851ad925dfc26cf625074cb352d2
SHA25630292fa7e983d4aef845273d7c5c4eba039f4949a8cdb385558393aef2fbda08
SHA5122e4c0de7281cdab5e97b10777df549baf161ee04850303af1ebfd0f0022b30c1932baf985f83adcdfb427451a5788e56e6ee154dabf4a1fdbf6335869bad4def
-
Filesize
10KB
MD5055f4f9260e07fc83f71877cbb7f4fad
SHA1a245131af1a182de99bd74af9ff1fab17977a72f
SHA2564209588362785b690d08d15cd982b8d1c62c348767ca19114234b21d5df74ddc
SHA512a8e82dc4435ed938f090f43df953ddad9b0075f16218c09890c996299420162d64b1dbfbf613af37769ae796717eec78204dc786b757e8b1d13d423d4ee82e26
-
Filesize
14KB
MD5325b008aec81e5aaa57096f05d4212b5
SHA127a2d89747a20305b6518438eff5b9f57f7df5c3
SHA256c9cd5c9609e70005926ae5171726a4142ffbcccc771d307efcd195dafc1e6b4b
SHA51218362b3aee529a27e85cc087627ecf6e2d21196d725f499c4a185cb3a380999f43ff1833a8ebec3f5ba1d3a113ef83185770e663854121f2d8b885790115afdf
-
Filesize
11KB
MD5c17103ae9072a06da581dec998343fc1
SHA1b72148c6bdfaada8b8c3f950e610ee7cf1da1f8d
SHA256dc58d8ad81cacb0c1ed72e33bff8f23ea40b5252b5bb55d393a0903e6819ae2f
SHA512d32a71aaef18e993f28096d536e41c4d016850721b31171513ce28bbd805a54fd290b7c3e9d935f72e676a1acfb4f0dcc89d95040a0dd29f2b6975855c18986f
-
Filesize
17KB
MD588ad3fd90fc52ac3ee0441a38400a384
SHA108bc9e1f5951b54126b5c3c769e3eaed42f3d10b
SHA256e58884695378cf02715373928bb8ade270baf03144369463f505c3b3808cbc42
SHA512359496f571e6fa2ec4c5ab5bd1d35d1330586f624228713ae55c65a69e07d8623022ef54337c22c3aab558a9b74d9977c8436f5fea4194899d9ef3ffd74e7dbb
-
Filesize
686B
MD5afad645720a52e54aaaca319588936cc
SHA1f6234232915249594fb01ee8afa5924291559399
SHA256cd2283f384b90c5ac732c05bd75146c81cceaddffec4a18116b8b795934e59cd
SHA512682b2809636e5a918181ccc9159f4e4902cc42d98d4e68fa1a778c1e6c0415c1c093dd62f4c59460c70e92ac4f48b560ecae972d92c3ee64e86ac4e1833aecec
-
Filesize
30KB
MD5b613862ee5e3f0bd9f16595531d4de33
SHA179306cdcd1c1c892ae6dc420174dc0d780861000
SHA25655cbdb858ca86ac5e4684779702ce958423ef93755b1bdabcb33def1355a0118
SHA5127b25b7eb4d6a55c7f3ce56cf69df6b8e12c8655a7433238ac0b31adb722c25891e9c06dba09a56016096ed05d1f29e50538fdb2e4014d17ef3697dbbd7bfd9d3
-
Filesize
1.8MB
MD5a776b5e633a401acfc53a3dab01da963
SHA10426262addab8691bceb13da76fd391da926a5d4
SHA2565bec349f25c93825bb36af7117a881175ab7a56d633f104f719e96e0d21401c1
SHA51279ebc77e24f4883a13d021bef9318ad09b9562b11d6d4630af483dd353c474607d3ca38f099186a4c31751dec1381da24fe2c7212333f2318c8e343e11b37ce4
-
Filesize
143KB
MD530fadfd7d990bf3afcc6d7f5edd7968b
SHA13fcd942c61882afb3fc0263200357c73cd6a804f
SHA256a46acc938b658fb96acb9187a1d316662ffc55981311bdbfa13d87436c2e4060
SHA51211e8e164370082a6f05bc83b7d2037eae921f7e6a6bd2a0178f976da4ef81c4be7a389716ddf0acc147a2e1c966a96648e8890c41bd1d5de6c361002c76b4c36