Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2024, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe
Resource
win10v2004-20231222-en
General
-
Target
3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe
-
Size
663KB
-
MD5
3ecb9ec3bdb4b4cedc2b0bf90e2a65ff
-
SHA1
c49d9bb05210d6f581635ecb8d11a90c253ff283
-
SHA256
eb01159dd0da755c77baf8b111a89f52dbcebd17739fa8a595905c84a815a37e
-
SHA512
2305cca826b0f28315b0ee9e0c4dbb0b3703dd6a2888cfd7447cff9386ffa56ccb610da4e9b4b59383b890926cee459c721d98aba9fa16c451907e0a8e03c684
-
SSDEEP
12288:GFGawBwy2MZqy4e2TgQCgjUapKV22oLeuMNRwE4jvTYolQBGBWyFmErLKd9XqdgT:Nawr7Zo7CgZu2E4Sx0OT
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe -
Executes dropped EXE 2 IoCs
pid Process 64 ope4BFD.exe 1804 G_Server1.23.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\G_Server1.23.exe ope4BFD.exe File opened for modification C:\Windows\G_Server1.23.exe ope4BFD.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1804 G_Server1.23.exe -
Suspicious use of WriteProcessMemory 5 IoCs
description pid Process procid_target PID 316 wrote to memory of 64 316 3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe 89 PID 316 wrote to memory of 64 316 3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe 89 PID 316 wrote to memory of 64 316 3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe 89 PID 1804 wrote to memory of 2444 1804 G_Server1.23.exe 90 PID 1804 wrote to memory of 2444 1804 G_Server1.23.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe"C:\Users\Admin\AppData\Local\Temp\3ecb9ec3bdb4b4cedc2b0bf90e2a65ff.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\ope4BFD.exe"C:\Users\Admin\AppData\Local\Temp\ope4BFD.exe"2⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:64
-
-
C:\Program Files\Internet ExplorEr\IEXPLORE.EXE"C:\Program Files\Internet ExplorEr\IEXPLORE.EXE"1⤵PID:2444
-
C:\Windows\G_Server1.23.exeC:\Windows\G_Server1.23.exe1⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1804
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5e722a9d7ebcb34a4e5ae356cac3cd211
SHA1b6c5aefd93f748caefbe7f9e3c286e5083136a95
SHA2563de1295cce06a1c5e0b352efbc0a84076f3a67da26edd7984f9bc0d09106bfdb
SHA512911baa3034b030b9d06caac5b6bdd83c8b7f757130d3e27ca509e5dbe63af8664c95ea3233e4d894a91594e079305a82907697fe28794889dd2602eb65414244
-
Filesize
662KB
MD527d3c239e174703881f63ce3d8529a5c
SHA1cb74253ff5d6c23d57c83da03d297e1f2738540b
SHA25685740aa7a79037f63448363c1ab4b7c00dade664f8c54d433b39f3f329ba0584
SHA5122a50ef977df2bd4fd9af2698cd09700f7a40765548a66825882e56c425a4406709d208377d924399849fced9a8dfbf3bdd86fd0e26e08dcf8d11dda489ad6761
-
Filesize
640KB
MD532815ff7badea9bcd84e5e99b31a3a41
SHA14a8d716c18c01be7e24fc1bee0ccea292b01688f
SHA256a753c4b457c57d5132042e15e97427045be859538f47f6c8dc08cca8195fd666
SHA51256af73fd6ccbcfc4d1728517d6cd5b9a6066440edf640f45c8a62931cee6caed1cc26f3043bc8f19cc96ddd7f472f21117afac5617121845ecd9eb36ae56ddc7
-
Filesize
99KB
MD5d290cfba1aaf5a229bcf595531e451d8
SHA1842c96225b491d5c7335c5e29790112d92390c3e
SHA25699fa10e1039bce7672f5cfabcb4851274012b4210e2e602f5fcb29c7ca439889
SHA512104a38729f75bc4a2a57090b79337a2530d678f8b9cf6cda0e0377af22ad5d8d4dcd877bd35adba5843cefb6d4c4a0c79478ccb47d8a5ad1a8eaa2bad97c37f5
-
Filesize
93KB
MD58030acd13bc64d25eef34d8632760d10
SHA1db336493427c3bf7f558da5c4d125297297e2a04
SHA25638b59bf4a8333982753c639b55624007edefef8976e030997e70ec9a0e5b101c
SHA51251b54646106e71b7d9c31b83d5f8501acd382738cca09567ed6ce86a9bdf82adbf1b06c361fa4fc4ff4f3fa1190601ad760745caa5bc5cfdd3c245e0c743b42b