Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2024, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
50f23541d4dbf1abe9a4f08aa44409fb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
50f23541d4dbf1abe9a4f08aa44409fb.exe
Resource
win10v2004-20231222-en
General
-
Target
50f23541d4dbf1abe9a4f08aa44409fb.exe
-
Size
3.4MB
-
MD5
50f23541d4dbf1abe9a4f08aa44409fb
-
SHA1
73fc4cf521af56fc63c6fea9f02d5fae2a930bc8
-
SHA256
cd00a7e67d47f05e6bc2fe83217d1672685e75bc06d639698a01710899205919
-
SHA512
c877108c344aefe695938b787f87e1d464a76e96b4358145dfb5bc522a7024dd56ebc7d9a9a5a1f8519f1a3753fd6b4492fcfbe40dbf7e4a3dbfe09a3e2f86ea
-
SSDEEP
49152:vRUIaXCwmcg/7tSyWD5fE4luqaNaIXPPEf2OgiBVUrRZcjIWyt0xo:JUHXCwmcg/7tSFD5fE4luqacIU3vVSw
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 41 3940 cmd.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 50f23541d4dbf1abe9a4f08aa44409fb.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation CIu87NAvz4.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CIu87NAvz4.exe 50f23541d4dbf1abe9a4f08aa44409fb.exe -
Executes dropped EXE 2 IoCs
pid Process 2388 CIu87NAvz4.exe 2904 CIu87NAvz4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 2904 CIu87NAvz4.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe 3940 cmd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3856 wrote to memory of 4332 3856 50f23541d4dbf1abe9a4f08aa44409fb.exe 87 PID 3856 wrote to memory of 4332 3856 50f23541d4dbf1abe9a4f08aa44409fb.exe 87 PID 3856 wrote to memory of 4332 3856 50f23541d4dbf1abe9a4f08aa44409fb.exe 87 PID 4332 wrote to memory of 2388 4332 50f23541d4dbf1abe9a4f08aa44409fb.exe 96 PID 4332 wrote to memory of 2388 4332 50f23541d4dbf1abe9a4f08aa44409fb.exe 96 PID 4332 wrote to memory of 2388 4332 50f23541d4dbf1abe9a4f08aa44409fb.exe 96 PID 2388 wrote to memory of 2904 2388 CIu87NAvz4.exe 97 PID 2388 wrote to memory of 2904 2388 CIu87NAvz4.exe 97 PID 2388 wrote to memory of 2904 2388 CIu87NAvz4.exe 97 PID 2904 wrote to memory of 3940 2904 CIu87NAvz4.exe 100 PID 2904 wrote to memory of 3940 2904 CIu87NAvz4.exe 100 PID 2904 wrote to memory of 3940 2904 CIu87NAvz4.exe 100 PID 2904 wrote to memory of 3940 2904 CIu87NAvz4.exe 100 PID 2904 wrote to memory of 3940 2904 CIu87NAvz4.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\50f23541d4dbf1abe9a4f08aa44409fb.exe"C:\Users\Admin\AppData\Local\Temp\50f23541d4dbf1abe9a4f08aa44409fb.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\50f23541d4dbf1abe9a4f08aa44409fb.exe"C:\Users\Admin\AppData\Local\Temp\50f23541d4dbf1abe9a4f08aa44409fb.exe"2⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CIu87NAvz4.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CIu87NAvz4.exe" "C:\Users\Admin\AppData\Local\Temp\50f23541d4dbf1abe9a4f08aa44409fb.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CIu87NAvz4.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CIu87NAvz4.exe" "C:\Users\Admin\AppData\Local\Temp\50f23541d4dbf1abe9a4f08aa44409fb.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:3940
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
405KB
MD5487f258ad4487402141f36e6d77b33ee
SHA1d8f9b5c8f51d4789b42dfc1359f6d03b70beef8f
SHA256c50edf24e35fff77014b56057637d8f548b149585187340aab7fa9447d825810
SHA512268615dcfa175e681e657e19689b9d6c67507d1f8c542eaebc656fcf1adcd0da5e477d47740694c33cd922d17642f9dc86ee02c9269c18bd144f5d2c8a2c4d82
-
Filesize
385KB
MD54a7e565f1b233721a49d9421de836c62
SHA15ef958994627b299e4de0348cc29a97ef23a66aa
SHA2563610b16fa3ef1b6a2384f71b8f36ee9ffbcf903c254289d87de161cfe13470f2
SHA512055507f9ecccbc352634ad6b31beb1613d31c20c2687ec47d4773614183bd9a4e285e38fdb28dcec2f259f2abc7641a00f9270930188de488d1e4e5d95970efa
-
Filesize
349KB
MD5056397fab7f7bae1aa19e4765fbec88d
SHA1ac73b387d90b259d738c71ba5f2cb67325de4b61
SHA2567f404b37d7a1e0e70acbdadecaa2ab1679fd525fe8891514384d140560e41095
SHA512fe4fc87468299561c7277433c6f377b586f43a0a28b69679501ceeaaa00fde9b0dc01f702c3fbecb9f83f37895d4dd94bc03dd30cb575926f50c0472cf8c5874
-
Filesize
384KB
MD59f465a8ed1a57e7c142296131837148c
SHA16348117450d160f280b14a79aab963ed4127ab41
SHA256abf27944805b6b4678fae2d5c5328f58b469874b914bfde839e2bb547d8ea96a
SHA512767a9bba08950c1a38ef2ecc969ab28c8836c0920baf2184067ff974f48517465228b64e7f4cedf5d2525a5d1f1469ca251d56992d19f3510170eecfb8cd1a89