Analysis
-
max time kernel
27s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-01-2024 20:04
Static task
static1
Behavioral task
behavioral1
Sample
92d6ba75f17f81acd6f2523ac4f41a3e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
92d6ba75f17f81acd6f2523ac4f41a3e.exe
Resource
win10v2004-20231215-en
General
-
Target
92d6ba75f17f81acd6f2523ac4f41a3e.exe
-
Size
68KB
-
MD5
92d6ba75f17f81acd6f2523ac4f41a3e
-
SHA1
4d2ad67c2a087a25ab4824a0a53be6fb8796a582
-
SHA256
e94c812906232ee5b1d996531ccf90860657b65696f05b75d2bcf2afbdcf3638
-
SHA512
c146d3c658ed19532f87b1b066a94d019267d4d636807718ae6b533da1a57dda12d1e40024da313184ce47ae88b20e47bc97b4c6dcb65c507b87450b8aee529f
-
SSDEEP
768:TrItKyw5WHXfQmjIiIk9ecAa0Mb96SyX1DLdRXXXE000V:Tr3Z5IfQmv81ar1yXtZn
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 744 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\Control Panel\International\Geo\Nation 92d6ba75f17f81acd6f2523ac4f41a3e.exe -
Executes dropped EXE 1 IoCs
pid Process 1680 cwshost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Debug\cwshost.exe 92d6ba75f17f81acd6f2523ac4f41a3e.exe File opened for modification C:\Windows\Debug\cwshost.exe attrib.exe File created C:\Windows\Debug\cwshost.exe 92d6ba75f17f81acd6f2523ac4f41a3e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1060 wrote to memory of 744 1060 92d6ba75f17f81acd6f2523ac4f41a3e.exe 54 PID 1060 wrote to memory of 744 1060 92d6ba75f17f81acd6f2523ac4f41a3e.exe 54 PID 1060 wrote to memory of 744 1060 92d6ba75f17f81acd6f2523ac4f41a3e.exe 54 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 744 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\92d6ba75f17f81acd6f2523ac4f41a3e.exe"C:\Users\Admin\AppData\Local\Temp\92d6ba75f17f81acd6f2523ac4f41a3e.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\cwshost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:744
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\92D6BA~1.EXE > nul2⤵PID:2016
-
-
C:\Windows\Debug\cwshost.exeC:\Windows\Debug\cwshost.exe1⤵
- Executes dropped EXE
PID:1680