Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 06:26
Static task
static1
Behavioral task
behavioral1
Sample
5835f7375649e6871565a7ef1aac67d1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5835f7375649e6871565a7ef1aac67d1.exe
Resource
win10v2004-20231215-en
General
-
Target
5835f7375649e6871565a7ef1aac67d1.exe
-
Size
104KB
-
MD5
5835f7375649e6871565a7ef1aac67d1
-
SHA1
f88f311e292506b25d55e958d3d8039f5b21a3cf
-
SHA256
b9c68bb8d1bd7ebcfa7b81be65ce976207f07fff379a37ca8b18df4b82e92726
-
SHA512
48515a8bf5f65a8e67d62c75cec87531b4cb021afbaeeefe09e4d092a4d484e92e7085b8e8c80701162a957f1e76620d40ac950519e70a8f2b49337a6cce4217
-
SSDEEP
3072:dO/oA4eCemeWuG+2GMUtKftmJc0+6ODxcOHSrc3eU3RbaNB:dO/oA4eCemeWuG+2GMUQ0+hDqOHF3V3i
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 5835f7375649e6871565a7ef1aac67d1.exe -
Executes dropped EXE 2 IoCs
pid Process 1804 c9mgr.exe 2068 c9mgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\c9mgr = "C:\\Windows\\system32\\c9mgr.exe" 5835f7375649e6871565a7ef1aac67d1.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\c9mgr.exe 5835f7375649e6871565a7ef1aac67d1.exe File opened for modification C:\Windows\SysWOW64\c9mgr.exe 5835f7375649e6871565a7ef1aac67d1.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3036 set thread context of 1384 3036 5835f7375649e6871565a7ef1aac67d1.exe 89 PID 1804 set thread context of 2068 1804 c9mgr.exe 97 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1384 5835f7375649e6871565a7ef1aac67d1.exe 2068 c9mgr.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3036 wrote to memory of 1384 3036 5835f7375649e6871565a7ef1aac67d1.exe 89 PID 3036 wrote to memory of 1384 3036 5835f7375649e6871565a7ef1aac67d1.exe 89 PID 3036 wrote to memory of 1384 3036 5835f7375649e6871565a7ef1aac67d1.exe 89 PID 3036 wrote to memory of 1384 3036 5835f7375649e6871565a7ef1aac67d1.exe 89 PID 3036 wrote to memory of 1384 3036 5835f7375649e6871565a7ef1aac67d1.exe 89 PID 3036 wrote to memory of 1384 3036 5835f7375649e6871565a7ef1aac67d1.exe 89 PID 3036 wrote to memory of 1384 3036 5835f7375649e6871565a7ef1aac67d1.exe 89 PID 1384 wrote to memory of 2224 1384 5835f7375649e6871565a7ef1aac67d1.exe 94 PID 1384 wrote to memory of 2224 1384 5835f7375649e6871565a7ef1aac67d1.exe 94 PID 1384 wrote to memory of 2224 1384 5835f7375649e6871565a7ef1aac67d1.exe 94 PID 2224 wrote to memory of 1804 2224 cmd.exe 96 PID 2224 wrote to memory of 1804 2224 cmd.exe 96 PID 2224 wrote to memory of 1804 2224 cmd.exe 96 PID 1804 wrote to memory of 2068 1804 c9mgr.exe 97 PID 1804 wrote to memory of 2068 1804 c9mgr.exe 97 PID 1804 wrote to memory of 2068 1804 c9mgr.exe 97 PID 1804 wrote to memory of 2068 1804 c9mgr.exe 97 PID 1804 wrote to memory of 2068 1804 c9mgr.exe 97 PID 1804 wrote to memory of 2068 1804 c9mgr.exe 97 PID 1804 wrote to memory of 2068 1804 c9mgr.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\5835f7375649e6871565a7ef1aac67d1.exe"C:\Users\Admin\AppData\Local\Temp\5835f7375649e6871565a7ef1aac67d1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\5835f7375649e6871565a7ef1aac67d1.exeC:\Users\Admin\AppData\Local\Temp\5835f7375649e6871565a7ef1aac67d1.exe2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5835f7375649e6871565a7ef1aac67d1.bat" 0"3⤵
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\c9mgr.exeC:\Windows\system32\c9mgr.exe /B4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\c9mgr.exeC:\Windows\SysWOW64\c9mgr.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304B
MD542b2fd3644fba16aabae64767301e9a0
SHA128d46d313e8a787f8c553e65b9bea52330f85ddf
SHA256b6511161540ce262166d02e4831f456af55c9bdc14362adf5f20b8d83e3532ed
SHA51295270a037f4b9ade8c775e881cd4dda127e59104b8c12057b4d447c6256c261340407fe874e033b4e76c22426134e8e92098621e6e4b508f149fa0a9437409c3
-
Filesize
104KB
MD55835f7375649e6871565a7ef1aac67d1
SHA1f88f311e292506b25d55e958d3d8039f5b21a3cf
SHA256b9c68bb8d1bd7ebcfa7b81be65ce976207f07fff379a37ca8b18df4b82e92726
SHA51248515a8bf5f65a8e67d62c75cec87531b4cb021afbaeeefe09e4d092a4d484e92e7085b8e8c80701162a957f1e76620d40ac950519e70a8f2b49337a6cce4217