Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
11/01/2024, 17:17
Behavioral task
behavioral1
Sample
f9d8debc1102649a417608d746a73980.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f9d8debc1102649a417608d746a73980.exe
Resource
win10v2004-20231215-en
General
-
Target
f9d8debc1102649a417608d746a73980.exe
-
Size
352KB
-
MD5
f9d8debc1102649a417608d746a73980
-
SHA1
f27799f39a5cdc3db066f2d4bf734f25ed90ee81
-
SHA256
23118771c121bbf86b7099e0293d00d78d4b58d1da5e9b249f0e11d58791c70d
-
SHA512
1e2c20c5f6e3003b004d4cdbd428cb31933fe703ad8c195d1383a8beb76024dc835ced3ebad5a6b30b610b055456389a8b2bd0f5420fa0f458ec439386feebb0
-
SSDEEP
6144:u5FrtlrIiswtAyxmbeoYRMHpeW+5GZsNhHCUjg:uHrtqi3trxg4uHJXZsNhHCyg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation f9d8debc1102649a417608d746a73980.exe -
Executes dropped EXE 1 IoCs
pid Process 2464 Sysceammkauj.exe -
resource yara_rule behavioral2/memory/216-0-0x0000000000400000-0x000000000045A34C-memory.dmp upx behavioral2/files/0x000e000000023141-6.dat upx behavioral2/memory/216-38-0x0000000000400000-0x000000000045A34C-memory.dmp upx behavioral2/memory/2464-39-0x0000000000400000-0x000000000045A34C-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f9d8debc1102649a417608d746a73980.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe 2464 Sysceammkauj.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 216 wrote to memory of 2464 216 f9d8debc1102649a417608d746a73980.exe 92 PID 216 wrote to memory of 2464 216 f9d8debc1102649a417608d746a73980.exe 92 PID 216 wrote to memory of 2464 216 f9d8debc1102649a417608d746a73980.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9d8debc1102649a417608d746a73980.exe"C:\Users\Admin\AppData\Local\Temp\f9d8debc1102649a417608d746a73980.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\Sysceammkauj.exe"C:\Users\Admin\AppData\Local\Temp\Sysceammkauj.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
352KB
MD5bc46b448ccbb61ca97d8ea1963c6f108
SHA16403990eb757d28ca101adc29e9f486412a8a0e4
SHA256ae1c034169fd7f3db8407f723ed2c04bd38cecf5d72383cd1bc28f73068680f3
SHA512d4d4867a4374dc4096972114c58825b6d285b9bf48a48fa0afca1394cfaf58348780c66423ae5edef6def3efd4dcbf6c57ac7e74c46de5ece390eb84adf70334
-
Filesize
70B
MD5b9e0b86dfe9ad42cfcbaf2f2be852e5c
SHA11fe98dfb25e4dd8b6c266e905d805fab2bf85dce
SHA25605f72f7f46986a0eea29773940f89be2e6250ed60eb466cf1732f0fbf897ed9f
SHA512cba9af02517074312aba681f8a1edab5f44a8b3f2ea06be1b3f3ce58a1813fcc486bbb5a252ea0670e163921c4dc669cb697cdc70048f535857a28576dfd7bfa