Analysis
-
max time kernel
136s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15-01-2024 03:23
Static task
static1
Behavioral task
behavioral1
Sample
5c0195dcf62ea999de483648aa940db6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5c0195dcf62ea999de483648aa940db6.exe
Resource
win10v2004-20231215-en
General
-
Target
5c0195dcf62ea999de483648aa940db6.exe
-
Size
33KB
-
MD5
5c0195dcf62ea999de483648aa940db6
-
SHA1
98931034ef9a3ca59fb4323075fb1e3172affe80
-
SHA256
2d8cecbdc9db787e4231381ad2f33dc0a0652a594d4420289f550e3d2f2f08d2
-
SHA512
57bf02259753b879111fb228dc2a8cce3a4177cd2a1fbd05b41c90420245de353d3417c1b722eccc746f7ba7786a45fe75665d954fb009a89a8d7f2219fde4e2
-
SSDEEP
768:f74VjExo7S6lIc0wms0bKkPz/EmxCiuN/u73Nk8okt:f74Wo+FNDmE/Peujz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation sys32.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 5c0195dcf62ea999de483648aa940db6.exe -
Executes dropped EXE 2 IoCs
pid Process 452 sys32.exe 4528 sys32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Winjava vil = "sys32.exe" 5c0195dcf62ea999de483648aa940db6.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\WINDOWS\SysWOW64\sys32.exe 5c0195dcf62ea999de483648aa940db6.exe File created C:\WINDOWS\SysWOW64\sys32.exe sys32.exe File created C:\WINDOWS\SysWOW64\sys32.exe 5c0195dcf62ea999de483648aa940db6.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1944 4528 WerFault.exe 90 -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 764 wrote to memory of 452 764 5c0195dcf62ea999de483648aa940db6.exe 89 PID 764 wrote to memory of 452 764 5c0195dcf62ea999de483648aa940db6.exe 89 PID 764 wrote to memory of 452 764 5c0195dcf62ea999de483648aa940db6.exe 89 PID 452 wrote to memory of 4528 452 sys32.exe 90 PID 452 wrote to memory of 4528 452 sys32.exe 90 PID 452 wrote to memory of 4528 452 sys32.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c0195dcf62ea999de483648aa940db6.exe"C:\Users\Admin\AppData\Local\Temp\5c0195dcf62ea999de483648aa940db6.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:764 -
C:\WINDOWS\SysWOW64\sys32.exe"C:\WINDOWS\SYSTEM32\sys32.exe" qwerC:\USERS\ADMIN\APPDATA\LOCAL\TEMP\5C0195DCF62EA999DE483648AA940DB6.EXE2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:452 -
C:\WINDOWS\SysWOW64\sys32.exe"C:\WINDOWS\SYSTEM32\sys32.exe" qwerC:\WINDOWS\SYSWOW64\SYS32.EXE3⤵
- Executes dropped EXE
PID:4528 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4528 -s 1884⤵
- Program crash
PID:1944
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 4528 -ip 45281⤵PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD55c0195dcf62ea999de483648aa940db6
SHA198931034ef9a3ca59fb4323075fb1e3172affe80
SHA2562d8cecbdc9db787e4231381ad2f33dc0a0652a594d4420289f550e3d2f2f08d2
SHA51257bf02259753b879111fb228dc2a8cce3a4177cd2a1fbd05b41c90420245de353d3417c1b722eccc746f7ba7786a45fe75665d954fb009a89a8d7f2219fde4e2