Analysis
-
max time kernel
0s -
max time network
72s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 10:20
Static task
static1
Behavioral task
behavioral1
Sample
1e567e801406427827e509bf37646d52.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1e567e801406427827e509bf37646d52.exe
Resource
win10v2004-20231215-en
General
-
Target
1e567e801406427827e509bf37646d52.exe
-
Size
424KB
-
MD5
1e567e801406427827e509bf37646d52
-
SHA1
726221e2a319c2e6ce28117519239740d79dc04f
-
SHA256
6c74e50ceaa637126b99063629235109343c9d26a47b5600b8ab0d89d7718b8e
-
SHA512
ce2e4d5aa6dbe95a4f7729c5467cb6a639542e057c29aa7a0b28dc932d1076d52519739fe16097e69af195f2871b247aa226b6014c53ca633ea18f64483911ca
-
SSDEEP
12288:+isrem3UQJ50J8HCpiz71c2E1GvGc62e:+isrDo8iM15Gca
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 1e567e801406427827e509bf37646d52.exe -
Executes dropped EXE 1 IoCs
pid Process 4784 IwTQJSaLxi.exe -
resource yara_rule behavioral2/memory/1132-2-0x0000000000600000-0x0000000000671000-memory.dmp upx behavioral2/memory/4784-21-0x0000000000600000-0x0000000000671000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IwTQJSaLxi = "C:\\ProgramData\\IwTQJSaLxi.exe" 1e567e801406427827e509bf37646d52.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 1e567e801406427827e509bf37646d52.exe Key created \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Software\Microsoft\Internet Explorer\Download 1e567e801406427827e509bf37646d52.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1132 1e567e801406427827e509bf37646d52.exe 1132 1e567e801406427827e509bf37646d52.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1132 wrote to memory of 4784 1132 1e567e801406427827e509bf37646d52.exe 17 PID 1132 wrote to memory of 4784 1132 1e567e801406427827e509bf37646d52.exe 17 PID 1132 wrote to memory of 4784 1132 1e567e801406427827e509bf37646d52.exe 17 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System 1e567e801406427827e509bf37646d52.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" 1e567e801406427827e509bf37646d52.exe -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 4360 attrib.exe 4792 attrib.exe 408 attrib.exe 3888 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\1e567e801406427827e509bf37646d52.exe"C:\Users\Admin\AppData\Local\Temp\1e567e801406427827e509bf37646d52.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1132 -
C:\ProgramData\IwTQJSaLxi.exe"C:\ProgramData\IwTQJSaLxi.exe"2⤵
- Executes dropped EXE
PID:4784 -
C:\Windows\SysWOW64\attrib.exeattrib +h "F:\*.*" /s /d3⤵
- Views/modifies file attributes
PID:4360
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\*.*" /s /d3⤵
- Views/modifies file attributes
PID:4792
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\ProgramData\Microsoft\Windows\Start Menu\*.* " /s /d3⤵
- Views/modifies file attributes
PID:408
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h "C:\Users\Admin\*.* " /s /d3⤵
- Views/modifies file attributes
PID:3888
-
-