Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/01/2024, 15:48
Static task
static1
Behavioral task
behavioral1
Sample
68045b7877a9b9a04086754c61af21fd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
68045b7877a9b9a04086754c61af21fd.exe
Resource
win10v2004-20231215-en
General
-
Target
68045b7877a9b9a04086754c61af21fd.exe
-
Size
16KB
-
MD5
68045b7877a9b9a04086754c61af21fd
-
SHA1
85b1fc6ed2e3c44976548cd73f1033e0466057c4
-
SHA256
652a52e60e4dc10525ed86389b8fe17d13de9067ee395dac345356361839935e
-
SHA512
3650fd8b77b265fbb4c16cd3b38bdf5e9ac6fecfc800b2b974c08c5ca3df47fd3d9e8829823ffd2441869cc16d38c1b15eb3f4bbcb01698ed27b2bdb7f063394
-
SSDEEP
192:1T20Zfmm/pEgyHwLNrAwVPn+mzFdcILhE/MQY7P3rGA6zqhVHBRSY:1GCa8pP+yHHLhE0N3aA6zqhfp
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 68045b7877a9b9a04086754c61af21fd.exe -
Executes dropped EXE 2 IoCs
pid Process 3552 antigen.exe 4436 sysmail.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\System mail = "0" sysmail.exe Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System mail = "0" sysmail.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\sysmail.exe 68045b7877a9b9a04086754c61af21fd.exe File created C:\Windows\sysmail.exe 68045b7877a9b9a04086754c61af21fd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4436 sysmail.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2476 wrote to memory of 3552 2476 68045b7877a9b9a04086754c61af21fd.exe 88 PID 2476 wrote to memory of 3552 2476 68045b7877a9b9a04086754c61af21fd.exe 88 PID 2476 wrote to memory of 3552 2476 68045b7877a9b9a04086754c61af21fd.exe 88 PID 2476 wrote to memory of 4436 2476 68045b7877a9b9a04086754c61af21fd.exe 89 PID 2476 wrote to memory of 4436 2476 68045b7877a9b9a04086754c61af21fd.exe 89 PID 2476 wrote to memory of 4436 2476 68045b7877a9b9a04086754c61af21fd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\68045b7877a9b9a04086754c61af21fd.exe"C:\Users\Admin\AppData\Local\Temp\68045b7877a9b9a04086754c61af21fd.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\antigen.exe"C:\Users\Admin\AppData\Local\Temp\antigen.exe"2⤵
- Executes dropped EXE
PID:3552
-
-
C:\Windows\sysmail.exe"C:\Windows\sysmail.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
PID:4436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD58aa82f1cf2be17479bb20a77cef6d749
SHA1fcba93f838108eb257a1e4c90de2b904f9be9062
SHA256df3a8fe44621252fa75caf8b7d2e3fd341d51a27fdf2969779ecdf70e13a1338
SHA51272ea22c414f45d476261db516d4d1caa77d26fd011554e15fd13d8fb501b6d65e60c6ba003d69f1ca8214b7ec5c41599bc4b8ca7e77e34be3433fefa9c8be68d
-
Filesize
13KB
MD58234539bae3357cb503f92d9e3603da9
SHA162c108c1a21fdc0e75d609eeffe7da7b3e2e54aa
SHA2563ee00a08b2fd684d33b4047542b1898fd03ea74a53441d7b6e7b6cc074495622
SHA512222713b07f4712373e90ac1cf7ccb95b302e00ad737f85c7378262c907a81a3c4379695150752e3b05d53e1d14906f3eba04313d171a3918a2f98eb16c5c421f