Analysis
-
max time kernel
155s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 02:44
Static task
static1
Behavioral task
behavioral1
Sample
57c657d65e6f838951a7765587d0b0e6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
57c657d65e6f838951a7765587d0b0e6.exe
Resource
win10v2004-20231215-en
General
-
Target
57c657d65e6f838951a7765587d0b0e6.exe
-
Size
1.6MB
-
MD5
57c657d65e6f838951a7765587d0b0e6
-
SHA1
b5f4f3081036f1769a80b7dd885b6bffd1a8911a
-
SHA256
d6dda35121b08926af752fa94a6c7ed813ad6173d770dab74512c7e1bd519adc
-
SHA512
c8c96844076adebd798c6df13b4791ebfd81871505ae2a919dfe8a300d55f58b44877173bdfe951b510d46ba0269ec877cc3b6b6bd5325b9ad92e1685879bb63
-
SSDEEP
49152:fZgu8rAi+3USz3h1/XBkThdTlpSuxQxN9dT4S9Q:fGIjR1Oh0Tk
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 57c657d65e6f838951a7765587d0b0e6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4684 57c657d65e6f838951a7765587d0b0e6.exe 4684 57c657d65e6f838951a7765587d0b0e6.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4684 57c657d65e6f838951a7765587d0b0e6.exe 4684 57c657d65e6f838951a7765587d0b0e6.exe 4684 57c657d65e6f838951a7765587d0b0e6.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4684 wrote to memory of 2824 4684 57c657d65e6f838951a7765587d0b0e6.exe 98 PID 4684 wrote to memory of 2824 4684 57c657d65e6f838951a7765587d0b0e6.exe 98 PID 4684 wrote to memory of 2824 4684 57c657d65e6f838951a7765587d0b0e6.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\57c657d65e6f838951a7765587d0b0e6.exe"C:\Users\Admin\AppData\Local\Temp\57c657d65e6f838951a7765587d0b0e6.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4978.bat" "C:\Users\Admin\AppData\Local\Temp\D1BDD40752184763AF933AC3345FC5AB\""2⤵PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\D1BDD40752184763AF933AC3345FC5AB\D1BDD40752184763AF933AC3345FC5AB_LogFile.txt
Filesize2KB
MD5e74f69d9a40bfa16197655794a541b27
SHA11aca6bd4b2cd253b70ec02bb3b3735a32b64bf9a
SHA2562ba1e3e2d0155c1280c89cfb26c6ea9ab4e08c0dc5caabc8e4d497d41c20dedf
SHA51273d99fea865fccd15893e5a202cb2dd6c81d7134746337ce85091a5004950263d315ad9bf0092a6e151e985cdb398c8d66fe25131dec418e139dad822510590f
-
C:\Users\Admin\AppData\Local\Temp\D1BDD40752184763AF933AC3345FC5AB\D1BDD40752184763AF933AC3345FC5AB_LogFile.txt
Filesize1KB
MD589ee8346c2fe115324c70f57696798b0
SHA1719069dd048502dc3284f992644cf0616ff49805
SHA256bdb4135d9513db749250c6edbe513f8e4f2623052b6c7bf8ef1f36b2a65497a9
SHA51229d8c44b23bc386d24200e2db8266be459d86b2db64bf3efc532e813b82a849f8fbd70b3ba261042bd282f43d09ebb34aab9f233cbfc88ba7bb8c0be95656399
-
C:\Users\Admin\AppData\Local\Temp\D1BDD40752184763AF933AC3345FC5AB\D1BDD40752184763AF933AC3345FC5AB_LogFile.txt
Filesize9KB
MD53eeaa53f40fedbd1d67557491cab4720
SHA19fcdccb1590d5b510d1cf95ab2a8498a0bfccd09
SHA256dbfa83d1d61cc71b12e9bfe8b273e8461d54eac33ba69968b538244086a3a541
SHA51219df0647dd12d1886c107d870b60e9e25e9489c33193ce8a82548a13556338942ee4c23d9dd77d82fcc09d654feabd96d180fefb3be5e71591414796864bbf5f
-
Filesize
105KB
MD51a88f45c2a89dc7436916bf769b4fd30
SHA1c0c8b9adb23ba27857980a5684bdaacf90fdd0eb
SHA256e8573d40b42ab3c106c36fbc9c513805a0c9b371eb760efebf72743bca678110
SHA512ae26cd7b594b0ef2a7a29ee9063d562ecd5f8269570e402600bd2cb23eb10b018c1309aceeea51edd9db24662b548896044b0d9607e25265d19875dba7925bf4