Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 14:49
Static task
static1
Behavioral task
behavioral1
Sample
3d21dd3959166c87ef0fdeaed773998a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3d21dd3959166c87ef0fdeaed773998a.exe
Resource
win10v2004-20231215-en
General
-
Target
3d21dd3959166c87ef0fdeaed773998a.exe
-
Size
859KB
-
MD5
3d21dd3959166c87ef0fdeaed773998a
-
SHA1
a351e73c40a33c57054c8485e90de28e6fc60376
-
SHA256
095740b1c9a55ecadf092a977256456eb4e55b98679ca3307e26faa4d9ff76a6
-
SHA512
68eb78bb8c4723c95364b92440bcdd050db520d25242bc1fb2ed4c29b3660cea9f6bbd5607d81155f0fc78cac3dc08e348dafa05cf3a95b1895a77a7558e2c05
-
SSDEEP
24576:I0O+3i+6NjunrVOrE7ofKBeDybRrmFwLTjH:I05VwwVsOmuv7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 3d21dd3959166c87ef0fdeaed773998a.exe -
Executes dropped EXE 1 IoCs
pid Process 2740 mr5.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Manager 1 = "C:\\Windows\\KlD.exe" mr5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Manager 2 = "C:\\Windows\\KKl2.exe" mr5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Manager 3 = "C:\\Windows\\KKl3.exe" mr5.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Manager 4 = "C:\\Windows\\KKl4.exe" mr5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 216 3d21dd3959166c87ef0fdeaed773998a.exe 216 3d21dd3959166c87ef0fdeaed773998a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2740 mr5.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 216 wrote to memory of 2740 216 3d21dd3959166c87ef0fdeaed773998a.exe 89 PID 216 wrote to memory of 2740 216 3d21dd3959166c87ef0fdeaed773998a.exe 89 PID 216 wrote to memory of 2740 216 3d21dd3959166c87ef0fdeaed773998a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\3d21dd3959166c87ef0fdeaed773998a.exe"C:\Users\Admin\AppData\Local\Temp\3d21dd3959166c87ef0fdeaed773998a.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\mr5.exe"C:\Users\Admin\AppData\Local\Temp\mr5.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:2740
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD56cdccd3e402831bc64ff749875c1d1d9
SHA120739aa83a73599f4fd7fe65906a3c65bff469b1
SHA2565387f7d6572c83a9df2a18909e463e53907a56eebb5478de07150f7a0360a5a5
SHA51274df0d0270a22f31f5428db0dc5291ca35f2ac3c66d8818e59aab52313d5b528b128fffe189825c0917dda46ed140e41c06ce2407de0e758ab63b99099ebe40d