Analysis
-
max time kernel
139s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 21:22
Static task
static1
Behavioral task
behavioral1
Sample
59725cb0473db90956b9116d7ff7541f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59725cb0473db90956b9116d7ff7541f.exe
Resource
win10v2004-20231215-en
General
-
Target
59725cb0473db90956b9116d7ff7541f.exe
-
Size
681KB
-
MD5
59725cb0473db90956b9116d7ff7541f
-
SHA1
e67295a2f03192631a51411221e907eaa0c0136a
-
SHA256
75f019ec7eb220c52b4c48b9b0f575254dbce6cd82bddf9e149ccb58486e655f
-
SHA512
ee70e4447483c61b35eb8e6f406a0e7f9c4db54d0299c413b416d645f36ed9f991a9aead82a46da231e6d619a15708838a12813fd4a46a510d9bf4ad641112c1
-
SSDEEP
12288:xeq2Jz4KcrdxByDWaR2sJvjGCDXJlbhvnDloCbKtrGxhl1xLO:xqz6xa2aD75nnbKsxhl1xy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 59725cb0473db90956b9116d7ff7541f.exe -
Executes dropped EXE 2 IoCs
pid Process 1440 tmp1.exe 4420 tmp2.exe -
Loads dropped DLL 48 IoCs
pid Process 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe 4420 tmp2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2480 1440 WerFault.exe 92 -
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x000600000002310f-14.dat nsis_installer_1 -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1136 59725cb0473db90956b9116d7ff7541f.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1136 wrote to memory of 1440 1136 59725cb0473db90956b9116d7ff7541f.exe 92 PID 1136 wrote to memory of 1440 1136 59725cb0473db90956b9116d7ff7541f.exe 92 PID 1136 wrote to memory of 1440 1136 59725cb0473db90956b9116d7ff7541f.exe 92 PID 1136 wrote to memory of 4420 1136 59725cb0473db90956b9116d7ff7541f.exe 93 PID 1136 wrote to memory of 4420 1136 59725cb0473db90956b9116d7ff7541f.exe 93 PID 1136 wrote to memory of 4420 1136 59725cb0473db90956b9116d7ff7541f.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\59725cb0473db90956b9116d7ff7541f.exe"C:\Users\Admin\AppData\Local\Temp\59725cb0473db90956b9116d7ff7541f.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\tmp1.exe"C:\Users\Admin\AppData\Local\Temp\tmp1.exe"2⤵
- Executes dropped EXE
PID:1440 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1440 -s 2363⤵
- Program crash
PID:2480
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp2.exe"C:\Users\Admin\AppData\Local\Temp\tmp2.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4420
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 1440 -ip 14401⤵PID:4868
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD583c5a8e90cd10cb31a9215eb4421341f
SHA152ddbbfa955936f87516c52b2bb679a6b4363e22
SHA256da006773e11871b8834036c30acab8fabcce2c9e9f52bb2b425f947bdf33f7c6
SHA51246c20fd762a643028f3c4287ed3dbd762bc1cd17ee5ad1d90cbad23f15901fbab14b726d7f3e45eeb370fb6a2ee5268a2e9ebaae7ab6067c855361d24fc806a4
-
Filesize
10KB
MD5d4d09da0218ba046a66a294f0cca9dfe
SHA1417b1acdeb0a4de6ac752a93080ca5b9164eb44b
SHA2569090e47d239aa1da9598a483861165e0153c01ad9ff9d65cb6c0f4497a1da5b3
SHA5123bc9a65842301dab56c139cc5a3457158d37ef294583728c93da1e11ae457df9551b0f8fbd03d5ea3058f3bc794d0ede57ea3efd5d663b45d25647a39cd955bf
-
Filesize
45KB
MD576244c7d1578475d209ec88a2c3298fc
SHA16a9fc2390e3a07a48bc1d6b081f02444cee671b0
SHA256b138120aee762fc3d31d353c3664b3d455ad2f9d40348a063adf60ebbea0b9c6
SHA51233e3ca52e04f602914df8b7d764d875caddb39cd23eb116a7b14b0d77d45e4bddeff68b3051cd5491934dbc119dc9a663aeb6962c05e47dd9cefeebe88dafd0a
-
Filesize
620KB
MD529c71a94981761d489143be5b5e9ef1b
SHA1c7f0c631ccce90ab7f79a74c7998bcb27b28bf68
SHA256c3f1865c755c1049f55c996d38d7398f2ba8d868ffefbc90e5d8d9082b290d73
SHA5128b881f550e5be95f950a89278b2d91521d3bcb7bf43390e5cc09f20e25fc8ae006e89a62f43b81ee8cb2f1f70d8cde791470e8d1a0bdc82c857ae3945f64a04d