Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-01-2024 15:08
Static task
static1
Behavioral task
behavioral1
Sample
56ca43ba032d7b7929cf2e28207be039.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56ca43ba032d7b7929cf2e28207be039.exe
Resource
win10v2004-20231215-en
General
-
Target
56ca43ba032d7b7929cf2e28207be039.exe
-
Size
27KB
-
MD5
56ca43ba032d7b7929cf2e28207be039
-
SHA1
2fd42dec311104b87d601d406bb4fbd8c158a29f
-
SHA256
d0fff4c29b2105289d2bb121a80c990e3f7d110f89978a8e8254a9c6eba95784
-
SHA512
c62c8ad1d100e963505045c0b1fb95eb2896b90673b346c21d4a3f5d80b066320ee11284a45cf1e6b21158cde9fa35b43fb689f12f3a4957187b0dbaf7912820
-
SSDEEP
768:ENy+CCW5uVi8ZgT2MMWN5xUpGa/9SPji:EN3e58ZgToWN5QSPO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 56ca43ba032d7b7929cf2e28207be039.exe Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation win32us.exe -
Deletes itself 1 IoCs
pid Process 1256 win32us.exe -
Executes dropped EXE 2 IoCs
pid Process 1256 win32us.exe 4648 win32us.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\win32us = "c:\\windows\\system32\\win32us.exe /noconnect" 56ca43ba032d7b7929cf2e28207be039.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\win32us = "c:\\windows\\system32\\win32us.exe /noconnect" win32us.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\win32us.exe 56ca43ba032d7b7929cf2e28207be039.exe File opened for modification \??\c:\windows\SysWOW64\win32us.exe 56ca43ba032d7b7929cf2e28207be039.exe File opened for modification C:\Windows\SysWOW64\win32us.exe 56ca43ba032d7b7929cf2e28207be039.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 316 wrote to memory of 1256 316 56ca43ba032d7b7929cf2e28207be039.exe 90 PID 316 wrote to memory of 1256 316 56ca43ba032d7b7929cf2e28207be039.exe 90 PID 316 wrote to memory of 1256 316 56ca43ba032d7b7929cf2e28207be039.exe 90 PID 1256 wrote to memory of 4648 1256 win32us.exe 92 PID 1256 wrote to memory of 4648 1256 win32us.exe 92 PID 1256 wrote to memory of 4648 1256 win32us.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\56ca43ba032d7b7929cf2e28207be039.exe"C:\Users\Admin\AppData\Local\Temp\56ca43ba032d7b7929cf2e28207be039.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:316 -
C:\windows\SysWOW64\win32us.exe"C:\windows\system32\win32us.exe" -kill c:\users\admin\appdata\local\temp\56ca43ba032d7b7929cf2e28207be039.exe /install2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\windows\SysWOW64\win32us.exe"C:\windows\system32\win32us.exe" -kill c:\windows\syswow64\win32us.exe /install /install3⤵
- Executes dropped EXE
PID:4648
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27KB
MD556ca43ba032d7b7929cf2e28207be039
SHA12fd42dec311104b87d601d406bb4fbd8c158a29f
SHA256d0fff4c29b2105289d2bb121a80c990e3f7d110f89978a8e8254a9c6eba95784
SHA512c62c8ad1d100e963505045c0b1fb95eb2896b90673b346c21d4a3f5d80b066320ee11284a45cf1e6b21158cde9fa35b43fb689f12f3a4957187b0dbaf7912820