Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
18/01/2024, 20:27
Static task
static1
Behavioral task
behavioral1
Sample
65f6036f540d6582f4ca07c957860213.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65f6036f540d6582f4ca07c957860213.exe
Resource
win10v2004-20231222-en
General
-
Target
65f6036f540d6582f4ca07c957860213.exe
-
Size
27KB
-
MD5
65f6036f540d6582f4ca07c957860213
-
SHA1
ac1346ef3401c03a6e14196759fdd68ec57f6e22
-
SHA256
85222d65c157fd116db3d26f386d18f8e198a0550198fdbd921bdf5a79f3d452
-
SHA512
f9bf150a6c3ed361d15abcbd99e41e72346db1b2bb11a3f555c1ed65a0a2d7600765988af292ae36dba3a743b275b8869a0f8efa5788854e3c7458463e82c79c
-
SSDEEP
384:IC5azxFqgqja4u5oNh2iGDSd+BniLjlkh/GNz03+vlV4EuOdKlhLnlgM11jlZtO7:IiazxujwSd+BnitQGelznOp6yH
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 65f6036f540d6582f4ca07c957860213.exe -
Executes dropped EXE 1 IoCs
pid Process 956 94e3aae9-7065-49e2-a4cf-e44960c44472.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2472 65f6036f540d6582f4ca07c957860213.exe 2472 65f6036f540d6582f4ca07c957860213.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2472 65f6036f540d6582f4ca07c957860213.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2472 wrote to memory of 956 2472 65f6036f540d6582f4ca07c957860213.exe 25 PID 2472 wrote to memory of 956 2472 65f6036f540d6582f4ca07c957860213.exe 25 PID 2472 wrote to memory of 956 2472 65f6036f540d6582f4ca07c957860213.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\65f6036f540d6582f4ca07c957860213.exe"C:\Users\Admin\AppData\Local\Temp\65f6036f540d6582f4ca07c957860213.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\94e3aae9-7065-49e2-a4cf-e44960c44472.exe"C:\Users\Admin\AppData\Local\Temp\94e3aae9-7065-49e2-a4cf-e44960c44472.exe"2⤵
- Executes dropped EXE
PID:956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD5f80fa38d37eb2d1d1d3aec66003b5780
SHA1fd5e87fe12df96def7ec3823744c063ecbcf653d
SHA256eec418db69eab627d827a3d1b416ab5960af88ccde836a139f9c9c11d5556f55
SHA5123c1b9cf19759e80427cd81c53558f031ec0f404fdedf984f7a6635fadb64451a7a59ae4de16a41e4f508541c15e2a7dffcd65eb09cbc3eec442783e5d5a955d9