Analysis
-
max time kernel
161s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
05/01/2024, 08:46
Static task
static1
Behavioral task
behavioral1
Sample
43411fd891aec187a67208f31bec4137.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43411fd891aec187a67208f31bec4137.exe
Resource
win10v2004-20231215-en
General
-
Target
43411fd891aec187a67208f31bec4137.exe
-
Size
100KB
-
MD5
43411fd891aec187a67208f31bec4137
-
SHA1
f13bd50804c817091948556cfc7deda2955913c8
-
SHA256
1e87c5653b2e951afb781018ff2dd522733ce1e0972fda6334a3b1172e6a5b7f
-
SHA512
f72307d45361b05ca91c9d62d500162643406451a53487e3373f60f76ed6854f533e6162cf1a8118b132714bef6ba650902aab5989d232a75dd7c3e41bee2d0f
-
SSDEEP
3072:O8U2yJN5f661xRZbALxB1Ojdgx8GY8iJkMo:O8U2qy6rRZb7jxGY8iJe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 43411fd891aec187a67208f31bec4137.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation WScript.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\__tmp_rar_sfx_access_check_240635656 43411fd891aec187a67208f31bec4137.exe File created C:\WINDOWS\SysWOW64\asd.bat 43411fd891aec187a67208f31bec4137.exe File opened for modification C:\WINDOWS\SysWOW64\asd.bat 43411fd891aec187a67208f31bec4137.exe File created C:\WINDOWS\SysWOW64\syss.vbs 43411fd891aec187a67208f31bec4137.exe File opened for modification C:\WINDOWS\SysWOW64\syss.vbs 43411fd891aec187a67208f31bec4137.exe File created C:\WINDOWS\SysWOW64\t.t cmd.exe File opened for modification C:\WINDOWS\SysWOW64\t.t cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000_Classes\Local Settings 43411fd891aec187a67208f31bec4137.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 712 wrote to memory of 3508 712 43411fd891aec187a67208f31bec4137.exe 90 PID 712 wrote to memory of 3508 712 43411fd891aec187a67208f31bec4137.exe 90 PID 712 wrote to memory of 3508 712 43411fd891aec187a67208f31bec4137.exe 90 PID 3508 wrote to memory of 4992 3508 WScript.exe 92 PID 3508 wrote to memory of 4992 3508 WScript.exe 92 PID 3508 wrote to memory of 4992 3508 WScript.exe 92 PID 4992 wrote to memory of 1692 4992 cmd.exe 94 PID 4992 wrote to memory of 1692 4992 cmd.exe 94 PID 4992 wrote to memory of 1692 4992 cmd.exe 94 PID 1692 wrote to memory of 4452 1692 cmd.exe 95 PID 1692 wrote to memory of 4452 1692 cmd.exe 95 PID 1692 wrote to memory of 4452 1692 cmd.exe 95 PID 4452 wrote to memory of 3888 4452 net.exe 96 PID 4452 wrote to memory of 3888 4452 net.exe 96 PID 4452 wrote to memory of 3888 4452 net.exe 96 PID 4992 wrote to memory of 1840 4992 cmd.exe 97 PID 4992 wrote to memory of 1840 4992 cmd.exe 97 PID 4992 wrote to memory of 1840 4992 cmd.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\43411fd891aec187a67208f31bec4137.exe"C:\Users\Admin\AppData\Local\Temp\43411fd891aec187a67208f31bec4137.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\WINDOWS\system32\syss.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\System32\asd.bat" "3⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c net stop sharedaccess4⤵
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\WINDOWS\SysWOW64\net.exenet stop sharedaccess5⤵
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess6⤵PID:3888
-
-
-
-
C:\WINDOWS\SysWOW64\ftp.exeftp -s:t.t4⤵PID:1840
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45B
MD52eb0bdfe63f039ca11e5fec11a01edbd
SHA1ee536313771b34fea308499aab0212956a7518c4
SHA256f2cbc7fd2d24406a057486795a3c4a606bfa7fbf1a624f4ae179be85f32f7fa0
SHA512ee252e02c86494b60efe981036c2fcb5b5761b68c593e9e5211ecd0e2b4ed3cc2c541f6f533c77a1a4bcc3a1be08b66c4ffc7ff7dfce1efae578c32d9f3df8f9
-
Filesize
84B
MD5a9110e052be59f1f7b3fc724b7c693eb
SHA10ad61983c0ee231c5daaf4e83e513ef505c9fa77
SHA25669a1e054956800976be84e3d208583f79eca9ebea7e30a0fac068aef30d70b54
SHA5126bb1bd45248e5fc946617e2505bcc5d6e99d9a7216fe82317035e88ec17d1a8bf07a0f3c2fe9c61325fc1bb8709689b9d9cfe29c024f68bf9b3188f78f403f9c
-
Filesize
222B
MD5a51d60320588fd7b868022c2010025e3
SHA1dc3dd853e1667f41aecfb79ab8c4278efe9b7c4e
SHA256c98e91ce4795cda6efed6c7839c77c5d2ad86201c077a7c8b730987dcda62ddd
SHA512b6cbfc840500693d1a916c7be572be78f6aa2b883423be424bc99865aae2594bbd53b202e7101b0ab41fee0ce3fadffac68181eade6098e7eeee2ba53adf62e2