Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
7350622fc8ceb587cf01ca055d81874d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7350622fc8ceb587cf01ca055d81874d.exe
Resource
win10v2004-20231222-en
General
-
Target
7350622fc8ceb587cf01ca055d81874d.exe
-
Size
600KB
-
MD5
7350622fc8ceb587cf01ca055d81874d
-
SHA1
1b7017c4e4325bd4d01570a14ae1d06c5685b3eb
-
SHA256
2729f57d011b73c4cb6964ab3ce3433f820f5c7ee287032c3070640edcaa0fbf
-
SHA512
15b47c227ad5e4b6f8c8255091974421f5a3531687b76a311ed5e3472462da3f2e41bc2cd355997c749cdb3cf808bccbfff81be0bb809c9ed87fbbd1696f7abf
-
SSDEEP
12288:8oLDniit67XLIulF/me3THMCKQW8I473C6h2:5ii4XLIulF+e3TsrQfI47/2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 7350622fc8ceb587cf01ca055d81874d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\ISE = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7350622fc8ceb587cf01ca055d81874d.exe /cs:1 " 7350622fc8ceb587cf01ca055d81874d.exe Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ISE = "\"C:\\b2a7ad\\ISb2a_7.exe\" /s" 7350622fc8ceb587cf01ca055d81874d.exe -
Checks for any installed AV software in registry 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Eset\Nod\ 7350622fc8ceb587cf01ca055d81874d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2492 set thread context of 1944 2492 7350622fc8ceb587cf01ca055d81874d.exe 94 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 1072 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1072 taskkill.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2492 wrote to memory of 1944 2492 7350622fc8ceb587cf01ca055d81874d.exe 94 PID 2492 wrote to memory of 1944 2492 7350622fc8ceb587cf01ca055d81874d.exe 94 PID 2492 wrote to memory of 1944 2492 7350622fc8ceb587cf01ca055d81874d.exe 94 PID 2492 wrote to memory of 1944 2492 7350622fc8ceb587cf01ca055d81874d.exe 94 PID 2492 wrote to memory of 1944 2492 7350622fc8ceb587cf01ca055d81874d.exe 94 PID 1944 wrote to memory of 1072 1944 7350622fc8ceb587cf01ca055d81874d.exe 96 PID 1944 wrote to memory of 1072 1944 7350622fc8ceb587cf01ca055d81874d.exe 96 PID 1944 wrote to memory of 1072 1944 7350622fc8ceb587cf01ca055d81874d.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\7350622fc8ceb587cf01ca055d81874d.exe"C:\Users\Admin\AppData\Local\Temp\7350622fc8ceb587cf01ca055d81874d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\7350622fc8ceb587cf01ca055d81874d.exe"C:\Users\Admin\AppData\Local\Temp\7350622fc8ceb587cf01ca055d81874d.exe" "C:\Users\Admin\AppData\Local\Temp\7350622fc8ceb587cf01ca055d81874d.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Checks for any installed AV software in registry
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\SysWOW64\taskkill.exetaskkill.exe /F /IM MSASCui* /IM avg* /IM ash* /IM McSA* /IM msse*3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-