Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
473fed5f812be8a150ac26835833c182.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
473fed5f812be8a150ac26835833c182.exe
Resource
win10v2004-20231222-en
General
-
Target
473fed5f812be8a150ac26835833c182.exe
-
Size
762KB
-
MD5
473fed5f812be8a150ac26835833c182
-
SHA1
d03245f845bc8ec3d8321c0ef1660f4e24d3ae5c
-
SHA256
fed3a42c853446a04f1a3d3cfc4755b1bd83ba6f21815cea734f74e43c4b948a
-
SHA512
168e9430043dc021b168736cb27f185609c1614a0f148869288f803f1cb9ef5dee6ce0c255523edbf83128afb5c82e5baa3499813ccbdee3e15dd3e243f4b28c
-
SSDEEP
12288:ftobirltpeTtNXmLFhppAEDlPRCdc5XY/ouP9Tk284UhzSX65rdAmawrm29fPTnN:ftDltItNW7pjDlpt5XY/2TkXKza/29R
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation internal473fed5f812be8a150ac26835833c182.exe -
Executes dropped EXE 1 IoCs
pid Process 4588 internal473fed5f812be8a150ac26835833c182.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4812 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4588 internal473fed5f812be8a150ac26835833c182.exe 4588 internal473fed5f812be8a150ac26835833c182.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4588 internal473fed5f812be8a150ac26835833c182.exe 4588 internal473fed5f812be8a150ac26835833c182.exe 4588 internal473fed5f812be8a150ac26835833c182.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3680 wrote to memory of 4588 3680 473fed5f812be8a150ac26835833c182.exe 89 PID 3680 wrote to memory of 4588 3680 473fed5f812be8a150ac26835833c182.exe 89 PID 3680 wrote to memory of 4588 3680 473fed5f812be8a150ac26835833c182.exe 89 PID 4588 wrote to memory of 4528 4588 internal473fed5f812be8a150ac26835833c182.exe 101 PID 4588 wrote to memory of 4528 4588 internal473fed5f812be8a150ac26835833c182.exe 101 PID 4588 wrote to memory of 4528 4588 internal473fed5f812be8a150ac26835833c182.exe 101 PID 4528 wrote to memory of 4812 4528 cmd.exe 103 PID 4528 wrote to memory of 4812 4528 cmd.exe 103 PID 4528 wrote to memory of 4812 4528 cmd.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\473fed5f812be8a150ac26835833c182.exe"C:\Users\Admin\AppData\Local\Temp\473fed5f812be8a150ac26835833c182.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\nsw3EC0.tmp\internal473fed5f812be8a150ac26835833c182.exeC:\Users\Admin\AppData\Local\Temp\nsw3EC0.tmp\internal473fed5f812be8a150ac26835833c182.exe C:/Users/Admin/AppData/Local/Temp/nsw3EC0.tmp /baseInstaller='C:/Users/Admin/AppData/Local/Temp/473fed5f812be8a150ac26835833c182.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsw3EC0.tmp/fallbackfiles/'2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\30235.bat" "C:\Users\Admin\AppData\Local\Temp\D3AD13E2D5AC48DB93CDADC7FB9226FE\""3⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:4812
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD5ac138f87c89e17eac1885546a85edea7
SHA174fe88088e8217c52bf3fd15c52088b95a04a135
SHA25616cd961df77154a8ba59a7c0b1eb7d93d5e830b589e79763b2d82b762a0ae30e
SHA512847f11697d4aa67b15f5958c442b11626dcbd5cdf1668af6d7f39fdd475129bab7831800aa7ab7f6b4d02583d3ba6816f4d3c50a0bcb87cebdc0d7f07ebd8bef
-
Filesize
98B
MD5df42b4b0a371be9275f0c73776cdc381
SHA18d0da9b07cd08c3d2be3fe99c33cc23d3eee5513
SHA256b4d7682e8cbb4256eea8f7f922e6520c19956ac99db2b401051c161d59302fa0
SHA5122755ed387c55d4fc692e6f8e9e89a62df24beb242d2c3c6a95cb5e502c30969ed7f2e346eb874895920ecab5ae9a6242a3c373deab84d0305c924679eed5808b
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\D3AD13E2D5AC48DB93CDADC7FB9226FE\D3AD13E2D5AC48DB93CDADC7FB9226FE_LogFile.txt
Filesize5KB
MD500eb3cfb17d8869fa1a422467aff930e
SHA1ea9128e1f9a341b20e9f562fc8486799c4956204
SHA2561aec93140b62ea9059e9c69e62c0ac5e14014ba35210f7f3020c45cccb888c13
SHA512683b9a433c26b4570dc40ab0ab379598911d79fb746a3ca6ff14eaa1371a3f785832b1248dff546a2b0e30a43d4727f5e88a1110114ab488e2d8e457cda5b740
-
Filesize
27KB
MD598d6c7c23e7ec4990310c7572e251997
SHA194bd683b8eae9e2cb8ee29d456ecba5b511486e1
SHA256e10e365d74420f7f4827dc787f3e212aa5ca11ec33d124747f942fab36f2c772
SHA5123c4eac0872420e93063af169cae6c2586f0f2addaf6fe13ef452020d66646282ed273cbcee78d0e0dc41a1b638e50c7925e252d3b531625f0c86c6092381832e
-
Filesize
93KB
MD587826b3c11ccf7e2db33bf627d4bc72a
SHA1a977c2f6b91be3fc640208d0a111a26c355ac800
SHA2564c8440d49f106df904b9bd3b63dc3271a83e27dad41077894977015af59d5434
SHA5128b4ac167d2eb1ed15300a51e51c4eb1620ffa77087c560cd79ba5d6ba1c443efad6c69834885984376d7a95d99350ae8b9445b172dcf4228ecfe4b3faa90203b