Analysis
-
max time kernel
149s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 05:57
Behavioral task
behavioral1
Sample
3c0ff1476f4da58cc85553ab15fa03cc.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
3c0ff1476f4da58cc85553ab15fa03cc.exe
Resource
win10v2004-20231215-en
General
-
Target
3c0ff1476f4da58cc85553ab15fa03cc.exe
-
Size
100KB
-
MD5
3c0ff1476f4da58cc85553ab15fa03cc
-
SHA1
b74fc29e44fd167f17f8e75f74bbc8fe1cf35d0e
-
SHA256
386cb4a88b5c465c29db7093db94fe6b8e30bb41c2d994569b1fc05d9b1b82d2
-
SHA512
ee9542916a4411dd035618c71c5407f249d2e02dbe2b979b9cfd69960bd41402d0f9edf9af61a50b4ecd75eeb3da8d896654a70fa46426690ca8926e0697061f
-
SSDEEP
1536:TGnHF3PKBF8cRjz1HR9HlKGDnIiRlgrquiZ7HxGIo3/e7pKGPXlagvH0Lraw3Rpl:TGnHF3P8u4VpDL/laSUjGU6xr9r0
Malware Config
Extracted
arkei
installs#1
91.245.225.43/NES9pWl5eL.php
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\Control Panel\International\Geo\Nation 3c0ff1476f4da58cc85553ab15fa03cc.exe -
Executes dropped EXE 1 IoCs
pid Process 2636 ssqq.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2636 2116 3c0ff1476f4da58cc85553ab15fa03cc.exe 90 PID 2116 wrote to memory of 2636 2116 3c0ff1476f4da58cc85553ab15fa03cc.exe 90 PID 2116 wrote to memory of 2636 2116 3c0ff1476f4da58cc85553ab15fa03cc.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c0ff1476f4da58cc85553ab15fa03cc.exe"C:\Users\Admin\AppData\Local\Temp\3c0ff1476f4da58cc85553ab15fa03cc.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\ssqq.exe"C:\Users\Admin\AppData\Local\Temp\ssqq.exe"2⤵
- Executes dropped EXE
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5bc0fa9eea5e4c3a2fa4a8a11516e51cf
SHA1456197add38fe693d86d9a5254c966489bdc2d78
SHA25667148bf6ac6d459c6e657905e0954c5830976b88917ce10b4e8ee2e8f183bd00
SHA512a8250a5da40a3fb2dc73059255b2179f298d930209d9a56fa09e73da80eea157f698056ecf4bd66e61bd4dd024208ed0abf18fef70a56ba70a246b4778b0b10e