Analysis
-
max time kernel
144s -
max time network
176s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2024 16:36
Static task
static1
Behavioral task
behavioral1
Sample
59333f2abf7178f211439d828c48e7df.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59333f2abf7178f211439d828c48e7df.exe
Resource
win10v2004-20231215-en
General
-
Target
59333f2abf7178f211439d828c48e7df.exe
-
Size
48KB
-
MD5
59333f2abf7178f211439d828c48e7df
-
SHA1
14c40d54436293aa6e41767b02b7f243dbae6de5
-
SHA256
692d680db18cda87e53b654d609aa694a4652e20a08e8e8f0c2a6fb5ee9ff745
-
SHA512
53f5c513f0d1fd54f91f473be548cf28eb29f7dea599a0b89e5092f1d194b18d3f541a4b9ab81e84e7eabdf51207b1a16c50d95b2ec87f659147553486be311c
-
SSDEEP
768:peiynC7e+v5C5ODwQGi1Lq3BKCNUf1AKik4Pvmo:CCa+v5tWimUQm4mo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 59333f2abf7178f211439d828c48e7df.exe -
Executes dropped EXE 1 IoCs
pid Process 3780 ctfmon.exe -
Loads dropped DLL 1 IoCs
pid Process 4072 59333f2abf7178f211439d828c48e7df.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\ctfmon.exe 59333f2abf7178f211439d828c48e7df.exe File opened for modification C:\Windows\ctfmon.exe 59333f2abf7178f211439d828c48e7df.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4072 59333f2abf7178f211439d828c48e7df.exe 4072 59333f2abf7178f211439d828c48e7df.exe 4072 59333f2abf7178f211439d828c48e7df.exe 4072 59333f2abf7178f211439d828c48e7df.exe 4072 59333f2abf7178f211439d828c48e7df.exe 4072 59333f2abf7178f211439d828c48e7df.exe 4072 59333f2abf7178f211439d828c48e7df.exe 4072 59333f2abf7178f211439d828c48e7df.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4072 59333f2abf7178f211439d828c48e7df.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4072 wrote to memory of 3780 4072 59333f2abf7178f211439d828c48e7df.exe 91 PID 4072 wrote to memory of 3780 4072 59333f2abf7178f211439d828c48e7df.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\59333f2abf7178f211439d828c48e7df.exe"C:\Users\Admin\AppData\Local\Temp\59333f2abf7178f211439d828c48e7df.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\ctfmon.exe"C:\Windows\ctfmon.exe"2⤵
- Executes dropped EXE
PID:3780
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD559fe39bf6b09867fc986fc69155f9be7
SHA1ad6b241e6784643e164805617a74d1144dd8000f
SHA256c634e981d9a52d244728a22d3ca06c234c2ca838231c621ad8a4abe535bb802c
SHA5129bb7482878f725e9c26f756271108286d0b17eeba6919bcffe44a62b13bf8e53fd95ccc911aae8f40c10941d042ffb23947a0a75c0c297ce542dca9a6272e177
-
Filesize
207KB
MD51c1760ed4d19cdbecb2398216922628b
SHA166b6158b28cc2b970e454b6a8cf1824dd99e4029
SHA256d66458a3eb1b68715b552b3af32a9d2e889bbf8ac0c23c1afa8d0982023d1ce2
SHA512f058eda0c65e59105a7c794721697782f1e1db759c69a11dab09ca454aa89767addcc8ecefa54995527bc2cae983e44c9ed42b0973fdb47435b31428150b96db