Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2024 01:19
Static task
static1
Behavioral task
behavioral1
Sample
522750faea55a9ba369a56421a2f7219.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
522750faea55a9ba369a56421a2f7219.exe
Resource
win10v2004-20231222-en
General
-
Target
522750faea55a9ba369a56421a2f7219.exe
-
Size
1.9MB
-
MD5
522750faea55a9ba369a56421a2f7219
-
SHA1
cf45ef9af822ff8be56351d6ebc52ea01819f6b3
-
SHA256
2f99c8d069a1002b5f2966e3927524ea756735ddee0c4630267dfd347888e124
-
SHA512
9f93a8567740b952658124f5f125e66a673f7a6715a1fed69403aa3296bd78646126fd6fc62710bdc206015ede55d0524ddeffcd308303d518a0d1fe7e97dd29
-
SSDEEP
24576:WbXsSRWmsRHzvDlZ9mUD7ZLWKDCpgyRKO+mWWVv2gGMFUS4OFArW3:OsvHzblKU1okMFU+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 522750faea55a9ba369a56421a2f7219.exe -
Executes dropped EXE 1 IoCs
pid Process 1616 apodoren.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinPrafik = "C:\\Windows\\Waprop.exe" apodoren.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Adrykto\Polotoer\qolporet.avb 522750faea55a9ba369a56421a2f7219.exe File created C:\Program Files\Adrykto\Polotoer\apodoren.exe 522750faea55a9ba369a56421a2f7219.exe File opened for modification C:\Program Files\Adrykto\Polotoer\qolporet.avb 522750faea55a9ba369a56421a2f7219.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Waprop.exe apodoren.exe File opened for modification C:\Windows\Waprop.exe apodoren.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2664 wrote to memory of 1616 2664 522750faea55a9ba369a56421a2f7219.exe 94 PID 2664 wrote to memory of 1616 2664 522750faea55a9ba369a56421a2f7219.exe 94 PID 2664 wrote to memory of 1616 2664 522750faea55a9ba369a56421a2f7219.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\522750faea55a9ba369a56421a2f7219.exe"C:\Users\Admin\AppData\Local\Temp\522750faea55a9ba369a56421a2f7219.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Program Files\Adrykto\Polotoer\apodoren.exe"C:\Program Files\Adrykto\Polotoer\apodoren.exe" NULL2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:1616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5ebf876cbaffbd1818d7a62a25f97378f
SHA11532384376b8590760a258b7f01d8da7eb8f8e83
SHA25660cff53683007954c5521768d007f335aa567330d583ee16d275a1f8387b5c34
SHA512affe590644d64c4fce18dbf2b91d4120e85d4e191883333785daa91be4ee8aa874508bda465768384d37cc38a70cde07894f72867144d50d22b98dcbf96f2418
-
Filesize
1.0MB
MD5efb5cf889387b74127a0c5313a95c327
SHA134138d4e0e09f4f9b4ef93a2a97bf8de044f8be8
SHA256ef529b8fa304c598a254f24f8980f14a57c07ebaf9b078a826b437c652805892
SHA51278066364acf1468d93dfee2308fcc9315a6a8cfd43a542e7d67cacca936168c7036e743fc35639fd25645bda45d0933d7cd9a8ead24bf072670183f12d2ced4a