Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
18-01-2024 21:18
Static task
static1
Behavioral task
behavioral1
Sample
660e88b92b0ad767c26941e04bcfb121.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
660e88b92b0ad767c26941e04bcfb121.exe
Resource
win10v2004-20231215-en
General
-
Target
660e88b92b0ad767c26941e04bcfb121.exe
-
Size
11KB
-
MD5
660e88b92b0ad767c26941e04bcfb121
-
SHA1
990ea4c5d62f723cda5dc1e61a9f8b9c0bd3b51d
-
SHA256
6564dfb8e2e6c4a68495909d816204123905bb25537cf76f64b00e388d84655b
-
SHA512
36e168e0b33deddcc0433a33150162d1b1c2cd49254d7e4a0296b52c32228467d3e18c009a592ea60e307fee7528a8054375366b488a5f89df560fc512e7f4e6
-
SSDEEP
192:5ZH+V+cXezw8x5xYQjxoxg/C3PnzQrTWa:b+IcXeUYTjxWgun+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\Control Panel\International\Geo\Nation 660e88b92b0ad767c26941e04bcfb121.exe -
Executes dropped EXE 1 IoCs
pid Process 3668 svchosts.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-768304381-2824894965-3840216961-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU Key = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" svchosts.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM Key = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" svchosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1628 wrote to memory of 3668 1628 660e88b92b0ad767c26941e04bcfb121.exe 87 PID 1628 wrote to memory of 3668 1628 660e88b92b0ad767c26941e04bcfb121.exe 87 PID 1628 wrote to memory of 3668 1628 660e88b92b0ad767c26941e04bcfb121.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\660e88b92b0ad767c26941e04bcfb121.exe"C:\Users\Admin\AppData\Local\Temp\660e88b92b0ad767c26941e04bcfb121.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Roaming\svchosts.exe"C:\Users\Admin\AppData\Roaming\svchosts.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5660e88b92b0ad767c26941e04bcfb121
SHA1990ea4c5d62f723cda5dc1e61a9f8b9c0bd3b51d
SHA2566564dfb8e2e6c4a68495909d816204123905bb25537cf76f64b00e388d84655b
SHA51236e168e0b33deddcc0433a33150162d1b1c2cd49254d7e4a0296b52c32228467d3e18c009a592ea60e307fee7528a8054375366b488a5f89df560fc512e7f4e6