Analysis
-
max time kernel
168s -
max time network
197s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06-01-2024 16:10
Static task
static1
Behavioral task
behavioral1
Sample
46a6d599535c3b51644e102f65929c66.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
46a6d599535c3b51644e102f65929c66.exe
Resource
win10v2004-20231215-en
General
-
Target
46a6d599535c3b51644e102f65929c66.exe
-
Size
141KB
-
MD5
46a6d599535c3b51644e102f65929c66
-
SHA1
2115013bfc093dbfa96e802f246bdb262503c381
-
SHA256
cfe2896dbf34e40c57b1379c2606f37811b614b2df5dd8123e9efe56de7e9efb
-
SHA512
3856dc9786e84f9c0453b2640e7d2d09127d947a1057fed833e7e1bc25e08658e53cae8eea497531abab8f570a5eff7b7e937a219f588e73f44de2dd2b74eed0
-
SSDEEP
3072:Aa9mSvkAZ2M5MPACog7DMM/qX0Ktj2FbjBGhMYctCgggggDpKiuxEjFq5ukj:AaENi2MGYg2BctCgggggDpK/r
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 46a6d599535c3b51644e102f65929c66.exe -
Executes dropped EXE 1 IoCs
pid Process 1412 explorer.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\explorer.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\explorer.exe" explorer.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: explorer.exe File opened (read-only) \??\R: explorer.exe File opened (read-only) \??\S: explorer.exe File opened (read-only) \??\X: explorer.exe File opened (read-only) \??\E: explorer.exe File opened (read-only) \??\I: explorer.exe File opened (read-only) \??\M: explorer.exe File opened (read-only) \??\N: explorer.exe File opened (read-only) \??\P: explorer.exe File opened (read-only) \??\W: explorer.exe File opened (read-only) \??\Z: explorer.exe File opened (read-only) \??\H: explorer.exe File opened (read-only) \??\K: explorer.exe File opened (read-only) \??\O: explorer.exe File opened (read-only) \??\Q: explorer.exe File opened (read-only) \??\T: explorer.exe File opened (read-only) \??\G: explorer.exe File opened (read-only) \??\L: explorer.exe File opened (read-only) \??\U: explorer.exe File opened (read-only) \??\V: explorer.exe File opened (read-only) \??\Y: explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 46a6d599535c3b51644e102f65929c66.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3800 wrote to memory of 1412 3800 46a6d599535c3b51644e102f65929c66.exe 104 PID 3800 wrote to memory of 1412 3800 46a6d599535c3b51644e102f65929c66.exe 104 PID 3800 wrote to memory of 1412 3800 46a6d599535c3b51644e102f65929c66.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\46a6d599535c3b51644e102f65929c66.exe"C:\Users\Admin\AppData\Local\Temp\46a6d599535c3b51644e102f65929c66.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"C:\Users\Admin\AppData\Roaming\Microsoft\explorer.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
PID:1412
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141KB
MD546a6d599535c3b51644e102f65929c66
SHA12115013bfc093dbfa96e802f246bdb262503c381
SHA256cfe2896dbf34e40c57b1379c2606f37811b614b2df5dd8123e9efe56de7e9efb
SHA5123856dc9786e84f9c0453b2640e7d2d09127d947a1057fed833e7e1bc25e08658e53cae8eea497531abab8f570a5eff7b7e937a219f588e73f44de2dd2b74eed0