Analysis
-
max time kernel
154s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
c1c35220cb6bdf9c19b75738297a538d8d6a2b4fe3d421deb5b4140e840e3305.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
c1c35220cb6bdf9c19b75738297a538d8d6a2b4fe3d421deb5b4140e840e3305.exe
Resource
win10v2004-20231215-en
General
-
Target
c1c35220cb6bdf9c19b75738297a538d8d6a2b4fe3d421deb5b4140e840e3305.exe
-
Size
195KB
-
MD5
e285af036d375326b59ebf8b9796bbb7
-
SHA1
e6a1ec3611436c5ba7cc9b0f1776c3398e2ddd67
-
SHA256
c1c35220cb6bdf9c19b75738297a538d8d6a2b4fe3d421deb5b4140e840e3305
-
SHA512
c976a316117449d91eb0143e659da1a71317300359ede42993fede90b06eeeb87dce5d607457cb280b20395f7b115d5e18072ebbe1a1a49cc4215a46a44e7918
-
SSDEEP
6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCO+:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXX/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation c1c35220cb6bdf9c19b75738297a538d8d6a2b4fe3d421deb5b4140e840e3305.exe -
Executes dropped EXE 1 IoCs
pid Process 1636 xsqhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\xsqhost.exe c1c35220cb6bdf9c19b75738297a538d8d6a2b4fe3d421deb5b4140e840e3305.exe File opened for modification C:\Windows\Debug\xsqhost.exe c1c35220cb6bdf9c19b75738297a538d8d6a2b4fe3d421deb5b4140e840e3305.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 xsqhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz xsqhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1444 c1c35220cb6bdf9c19b75738297a538d8d6a2b4fe3d421deb5b4140e840e3305.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1444 wrote to memory of 4016 1444 c1c35220cb6bdf9c19b75738297a538d8d6a2b4fe3d421deb5b4140e840e3305.exe 95 PID 1444 wrote to memory of 4016 1444 c1c35220cb6bdf9c19b75738297a538d8d6a2b4fe3d421deb5b4140e840e3305.exe 95 PID 1444 wrote to memory of 4016 1444 c1c35220cb6bdf9c19b75738297a538d8d6a2b4fe3d421deb5b4140e840e3305.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1c35220cb6bdf9c19b75738297a538d8d6a2b4fe3d421deb5b4140e840e3305.exe"C:\Users\Admin\AppData\Local\Temp\c1c35220cb6bdf9c19b75738297a538d8d6a2b4fe3d421deb5b4140e840e3305.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\C1C352~1.EXE > nul2⤵PID:4016
-
-
C:\Windows\Debug\xsqhost.exeC:\Windows\Debug\xsqhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:1636
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
195KB
MD5c6f07a96357b2c946b17eece0c690db3
SHA1e85b41407c3f2cf6725b828fb9268067b7ad542d
SHA2563024dea75ab9aec89c092d6bc6b070ef8bb2ce34bd3860b7f3f664de45c787c8
SHA512ce3016a8d5a36bd98415edf09e614e6cf43a14bdb17b00d81b9d48e023970dd94ee91cf0b80e24d23f7283c034f2d89ae5792495ab5fa055d80f70a33a478d99