Analysis
-
max time kernel
149s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
07/01/2024, 10:22
Static task
static1
Behavioral task
behavioral1
Sample
48b7b491175b6eeac589438208d3eb26.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48b7b491175b6eeac589438208d3eb26.exe
Resource
win10v2004-20231215-en
General
-
Target
48b7b491175b6eeac589438208d3eb26.exe
-
Size
337KB
-
MD5
48b7b491175b6eeac589438208d3eb26
-
SHA1
bbdcaf1b1cbf0cc58128eb95596ed672097aa64b
-
SHA256
13d38e976d16b8c71f44e85ee12b549ed3cca1990fcc1814463bba57b09b253e
-
SHA512
13e43d2d77b72c27528185c310600c6a4eeba25cc98a6d2dfb64ab30f0410e34faed2e0cd02985fb09d53488a58d3166d32b3895c0ec248c9d6f8fc6a09f956a
-
SSDEEP
6144:rYJGOaUmbGq4hwAqKL30jadpnFxQRnpR6:cJGOYzCjqg30javmr6
Malware Config
Signatures
-
Creates new service(s) 1 TTPs
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 48b7b491175b6eeac589438208d3eb26.exe -
Loads dropped DLL 4 IoCs
pid Process 5096 48b7b491175b6eeac589438208d3eb26.exe 5096 48b7b491175b6eeac589438208d3eb26.exe 332 48b7b491175b6eeac589438208d3eb26.exe 332 48b7b491175b6eeac589438208d3eb26.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 4768 sc.exe 1056 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5096 48b7b491175b6eeac589438208d3eb26.exe 332 48b7b491175b6eeac589438208d3eb26.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 5096 wrote to memory of 1832 5096 48b7b491175b6eeac589438208d3eb26.exe 42 PID 5096 wrote to memory of 1832 5096 48b7b491175b6eeac589438208d3eb26.exe 42 PID 5096 wrote to memory of 1832 5096 48b7b491175b6eeac589438208d3eb26.exe 42 PID 1832 wrote to memory of 1056 1832 cmd.exe 45 PID 1832 wrote to memory of 1056 1832 cmd.exe 45 PID 1832 wrote to memory of 1056 1832 cmd.exe 45 PID 1832 wrote to memory of 4768 1832 cmd.exe 43 PID 1832 wrote to memory of 4768 1832 cmd.exe 43 PID 1832 wrote to memory of 4768 1832 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\48b7b491175b6eeac589438208d3eb26.exe"C:\Users\Admin\AppData\Local\Temp\48b7b491175b6eeac589438208d3eb26.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "sc create "48b7b491175b6eeac589438208d3eb26" binPath= "C:\Users\Admin\AppData\Local\Temp\48b7b491175b6eeac589438208d3eb26.exe" start= auto && sc start "48b7b491175b6eeac589438208d3eb26" "2⤵
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\sc.exesc start "48b7b491175b6eeac589438208d3eb26"3⤵
- Launches sc.exe
PID:4768
-
-
C:\Windows\SysWOW64\sc.exesc create "48b7b491175b6eeac589438208d3eb26" binPath= "C:\Users\Admin\AppData\Local\Temp\48b7b491175b6eeac589438208d3eb26.exe" start= auto3⤵
- Launches sc.exe
PID:1056
-
-
-
C:\Users\Admin\AppData\Local\Temp\48b7b491175b6eeac589438208d3eb26.exeC:\Users\Admin\AppData\Local\Temp\48b7b491175b6eeac589438208d3eb26.exe1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:332