Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
58d53a0d2cfb30999c8f85df90b0f6a6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
58d53a0d2cfb30999c8f85df90b0f6a6.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/StdUtils.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
$_3_.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
$_3_.exe
Resource
win10v2004-20231215-en
General
-
Target
58d53a0d2cfb30999c8f85df90b0f6a6.exe
-
Size
789KB
-
MD5
58d53a0d2cfb30999c8f85df90b0f6a6
-
SHA1
c1fab9ab4d9a0df787d814419881be84573ec90d
-
SHA256
9a3eccbaada8ec20bc5c83ae3604209cda18675831dc9fecea199e4ac21cd1ee
-
SHA512
0f1a6bfd63d23293446021340c207f753f7b336e4e569492af0946724134ecff5401ca5a368eb6afad5d131bf242cddbc1afef9dfdf060d5450ee173aa45e3e0
-
SSDEEP
12288:RtobbXN42nHq+EgqfRAUEcB3gOE6DZlZUXavlXluE70pFdZigcyrG4EEu443m:Rt8RHjEgYAw1hZlZTWQu7igcyKPEuj2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation internal58d53a0d2cfb30999c8f85df90b0f6a6.exe -
Executes dropped EXE 1 IoCs
pid Process 1356 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe -
Loads dropped DLL 1 IoCs
pid Process 1012 58d53a0d2cfb30999c8f85df90b0f6a6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3292 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1356 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe 1356 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1356 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe 1356 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe 1356 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1012 wrote to memory of 1356 1012 58d53a0d2cfb30999c8f85df90b0f6a6.exe 90 PID 1012 wrote to memory of 1356 1012 58d53a0d2cfb30999c8f85df90b0f6a6.exe 90 PID 1012 wrote to memory of 1356 1012 58d53a0d2cfb30999c8f85df90b0f6a6.exe 90 PID 1356 wrote to memory of 4580 1356 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe 97 PID 1356 wrote to memory of 4580 1356 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe 97 PID 1356 wrote to memory of 4580 1356 internal58d53a0d2cfb30999c8f85df90b0f6a6.exe 97 PID 4580 wrote to memory of 3292 4580 cmd.exe 99 PID 4580 wrote to memory of 3292 4580 cmd.exe 99 PID 4580 wrote to memory of 3292 4580 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\58d53a0d2cfb30999c8f85df90b0f6a6.exe"C:\Users\Admin\AppData\Local\Temp\58d53a0d2cfb30999c8f85df90b0f6a6.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\nsz7929.tmp\internal58d53a0d2cfb30999c8f85df90b0f6a6.exeC:\Users\Admin\AppData\Local\Temp\nsz7929.tmp\internal58d53a0d2cfb30999c8f85df90b0f6a6.exe /baseInstaller='C:/Users/Admin/AppData/Local/Temp/58d53a0d2cfb30999c8f85df90b0f6a6.exe' /fallbackfolder='C:/Users/Admin/AppData/Local/Temp/nsz7929.tmp/fallbackfiles/'2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\23298.bat" "C:\Users\Admin\AppData\Local\Temp\AEBD27775D7A4CC38E10C47CADDEC292\""3⤵
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10004⤵
- Runs ping.exe
PID:3292
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD57164007a959d2dab9ad9e7ff1a4fa3aa
SHA17fc26d445815d7f6030f457a8e42458dd061362c
SHA256aaa35b480a31a3963e100883b1a45f7346bc7543a7c1bf971b13c1fdcc0166be
SHA512216a1c1c520400963e656c039105de153ae1cf3eae76518ce22c056418c0c1d1afca62edd11d7d26a2da80a9a891662edf732b4c99b63f306c48c7aa5179e56f
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\AEBD27775D7A4CC38E10C47CADDEC292\AEBD27775D7A4CC38E10C47CADDEC292_LogFile.txt
Filesize9KB
MD5cf46de6bfaf57505876a026294076d92
SHA1054d3d258a8754b225aa48e4c04d987e04fe0ea3
SHA25666c2c63628ba1755d78cda0e5efaced8f829853936f5314a29b90b5c5f21cc1c
SHA512069853ad36be7e4316ef9bdda715431e2450917afbcef5de7367cf0bf0cbe7fd50c2a5ebd4c49ab470c81392b507062ba3a5c266f04edace65910eb02cf73481
-
Filesize
104KB
MD5bf379c7bbe64ce3bd7c3a016c200fe39
SHA18af72a45ac4acc2504651c684ff29f3643a6c080
SHA256fe1f5c7fefa1ed2d05eb24471292369b97200232cdf9881f89e5662e87bd5ae7
SHA512f6986645cd77f23e5a819c3bef6ba8ae8c43c85939a895c6c29d5d5c2a62de1b55315ef96158ce864d294fc6e13327ceff8d15c42a91926638050e40449663a4
-
Filesize
14KB
MD521010df9bc37daffcc0b5ae190381d85
SHA1a8ba022aafc1233894db29e40e569dfc8b280eb9
SHA2560ebd62de633fa108cf18139be6778fa560680f9f8a755e41c6ab544ab8db5c16
SHA51295d3dbba6eac144260d5fcc7fcd5fb3afcb59ae62bd2eafc5a1d2190e9b44f8e125290d62fef82ad8799d0072997c57b2fa8a643aba554d0a82bbd3f8eb1403e
-
Filesize
1.8MB
MD59ab5db4bb5971035b4d287d64f9676b5
SHA133d17f016339572dd05c124d6243fffefd0cd039
SHA256f2126481c02d2a5af29e56023902a0897d05867c1caaf8079cf6e1f05dd9b209
SHA512d36262fdd4d8bd083d8537f0698c423240c9e42b2dc0048e2470d87411f295d6e3428587b76b0486875495d502f1f31f9edf3eb6fdb914f13421b7f29fa5f066
-
Filesize
17KB
MD5055c2cb77fa2edc2802b7fd397b9c213
SHA1e6bf5af3427539bf609cfb8904b35803a06104d3
SHA25678d0ed2288334f341225acee3d6200d01bb0bb80b873c448ab151d0661817bf2
SHA5127dc2930b9ac4843cca0a073a9195ab0cfb684b29c13622d0f934fb4b4a45af0fbb3a033f6ba31216214a9cbc1966436c36dd065c44b014c5c2a03dfd0b005a65
-
Filesize
12KB
MD5fe272d040e82704707b19bfbf29d65ca
SHA1460de628ea63986a7e6390a1623d8ba32dc82aee
SHA2561cb036da61dc7b1ad62280681c724d74cbcc313d530a799728a4d38b4e2b1983
SHA5128a03f9f3ce7af53b2f119f9bd001ff3fd39f879de88723306e2a6c7e8cae679d2095be6d4520ea24035c86140ef01a178a0b2535674be5c39b8b2dde4d082b1b