Analysis
-
max time kernel
151s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 03:44
Static task
static1
Behavioral task
behavioral1
Sample
57e428162dea05f2007de291cf72aa38.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
57e428162dea05f2007de291cf72aa38.exe
Resource
win10v2004-20231215-en
General
-
Target
57e428162dea05f2007de291cf72aa38.exe
-
Size
37KB
-
MD5
57e428162dea05f2007de291cf72aa38
-
SHA1
5c19018972fe3b1feeab37fdae88218e883909fa
-
SHA256
a6dca8d3f25d0d1217b96e5ac88ce8863f972953b30156747006ea0070f7959a
-
SHA512
2bc75db8197aebc67e6052486c12fdbbbb52381231120babc93654d7450a36c580a4cce4e538701a1dd00945b2ece5a133108130d6c05fffc7a330fa613f281a
-
SSDEEP
768:9Rwz+D7cQSnXf7dxRvNZoWwbmz7SEsn5/PPH2Txva0g4J:92qmpPoWKm+Pn0g8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 57e428162dea05f2007de291cf72aa38.exe -
Executes dropped EXE 1 IoCs
pid Process 2632 realplay.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Real Media Player = "C:\\Windows\\system32\\realplay.exe" 57e428162dea05f2007de291cf72aa38.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Real Media Player = "C:\\Windows\\system32\\realplay.exe" 57e428162dea05f2007de291cf72aa38.exe Set value (str) \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Real Media Player = "C:\\Windows\\system32\\realplay.exe" realplay.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Real Media Player = "C:\\Windows\\system32\\realplay.exe" realplay.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\realplay.exe realplay.exe File created C:\Windows\SysWOW64\realplay.exe 57e428162dea05f2007de291cf72aa38.exe File opened for modification C:\Windows\SysWOW64\realplay.exe 57e428162dea05f2007de291cf72aa38.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2632 1736 57e428162dea05f2007de291cf72aa38.exe 91 PID 1736 wrote to memory of 2632 1736 57e428162dea05f2007de291cf72aa38.exe 91 PID 1736 wrote to memory of 2632 1736 57e428162dea05f2007de291cf72aa38.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\57e428162dea05f2007de291cf72aa38.exe"C:\Users\Admin\AppData\Local\Temp\57e428162dea05f2007de291cf72aa38.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\realplay.exe"C:\Windows\system32\realplay.exe" -u C:\Users\Admin\AppData\Local\Temp\57e428162dea05f2007de291cf72aa38.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37KB
MD557e428162dea05f2007de291cf72aa38
SHA15c19018972fe3b1feeab37fdae88218e883909fa
SHA256a6dca8d3f25d0d1217b96e5ac88ce8863f972953b30156747006ea0070f7959a
SHA5122bc75db8197aebc67e6052486c12fdbbbb52381231120babc93654d7450a36c580a4cce4e538701a1dd00945b2ece5a133108130d6c05fffc7a330fa613f281a