Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
67687f7f6552a3aad001e5a0c802c348.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67687f7f6552a3aad001e5a0c802c348.exe
Resource
win10v2004-20231222-en
General
-
Target
67687f7f6552a3aad001e5a0c802c348.exe
-
Size
213KB
-
MD5
67687f7f6552a3aad001e5a0c802c348
-
SHA1
0192ebef5f601cdcffa3c8b96ad53c3c34f05253
-
SHA256
c32a96d73f51de511004dbe9662db39ec24538e41592dccaaeb0ca0220b33e2d
-
SHA512
b8a4e71b288f26674c0e2667d0461e8405f06e4f9a30b1330cb9ecddf96f949e8f14eb4dd474245ecb9a21fe4d7ac20c92535b6b6fa0e7840a982680f9cf2132
-
SSDEEP
3072:AfP+miCL5fWqeKuIwxLBqbeeUJIj4tWVAHZux6fKQJ:8PECL5+/KunESeSxtuwnfX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 67687f7f6552a3aad001e5a0c802c348.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 740 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3888 wrote to memory of 368 3888 67687f7f6552a3aad001e5a0c802c348.exe 92 PID 3888 wrote to memory of 368 3888 67687f7f6552a3aad001e5a0c802c348.exe 92 PID 3888 wrote to memory of 368 3888 67687f7f6552a3aad001e5a0c802c348.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\67687f7f6552a3aad001e5a0c802c348.exe"C:\Users\Admin\AppData\Local\Temp\67687f7f6552a3aad001e5a0c802c348.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /q /c "C:\Users\Admin\AppData\Local\Temp\Xdf..bat" > nul 2> nul2⤵PID:368
-
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:2144
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210B
MD5c7e477342e1bace25cd29a48838cb0e7
SHA19a115edda825afa2c434a8570be574801ee34afc
SHA256d5902c6a0cb67157e728f876a7c6af85770ebd6841fdc031fb224f291696124f
SHA512178c931069ba3c2a71f97c5b97bb4cb55b7956a0209148d90d0522d5294b213a1a02d2304cfe649ec56b0f166f5468ee74aa15dab8a56773ed7aa8716492efc7