Analysis
-
max time kernel
91s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2024 16:55
Static task
static1
Behavioral task
behavioral1
Sample
7505b3af707679b4ef5dd5d0d60e94a5.exe
Resource
win7-20231215-en
General
-
Target
7505b3af707679b4ef5dd5d0d60e94a5.exe
-
Size
104KB
-
MD5
7505b3af707679b4ef5dd5d0d60e94a5
-
SHA1
456b87baf508aa8079f12642e9381ab7adfc984f
-
SHA256
333c5e939a6e8d5d57be40c17f164d0dcd3116c022645287213b84667b31663e
-
SHA512
35a31c0049469f0b97d0d2f02750451a7771c2527e68a8fe457a8071cc1be56d5f62bce88f3ebf6a4b7b22710c8066abbbd42cc5e97857325c25609b528cc623
-
SSDEEP
1536:Hn/oYXOOPRe442IlO1e3jN5rkzRNbo5bnB5wVk3dXyxzTWSzoX/O:H/owJR42veTNpkzD+B5wVktIcXm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
7505b3af707679b4ef5dd5d0d60e94a5.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 7505b3af707679b4ef5dd5d0d60e94a5.exe -
Executes dropped EXE 1 IoCs
Processes:
winlog.exepid process 2908 winlog.exe -
Drops file in Windows directory 1 IoCs
Processes:
7505b3af707679b4ef5dd5d0d60e94a5.exedescription ioc process File opened for modification C:\WINDOWS\Help\winlog.exe 7505b3af707679b4ef5dd5d0d60e94a5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 532 taskkill.exe 3508 taskkill.exe 2468 taskkill.exe 2836 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2836 taskkill.exe Token: SeDebugPrivilege 2468 taskkill.exe Token: SeDebugPrivilege 3508 taskkill.exe Token: SeDebugPrivilege 532 taskkill.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
7505b3af707679b4ef5dd5d0d60e94a5.exepid process 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
7505b3af707679b4ef5dd5d0d60e94a5.exedescription pid process target process PID 2180 wrote to memory of 2836 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe taskkill.exe PID 2180 wrote to memory of 2836 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe taskkill.exe PID 2180 wrote to memory of 2836 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe taskkill.exe PID 2180 wrote to memory of 2468 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe taskkill.exe PID 2180 wrote to memory of 2468 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe taskkill.exe PID 2180 wrote to memory of 2468 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe taskkill.exe PID 2180 wrote to memory of 3508 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe taskkill.exe PID 2180 wrote to memory of 3508 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe taskkill.exe PID 2180 wrote to memory of 3508 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe taskkill.exe PID 2180 wrote to memory of 532 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe taskkill.exe PID 2180 wrote to memory of 532 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe taskkill.exe PID 2180 wrote to memory of 532 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe taskkill.exe PID 2180 wrote to memory of 2908 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe winlog.exe PID 2180 wrote to memory of 2908 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe winlog.exe PID 2180 wrote to memory of 2908 2180 7505b3af707679b4ef5dd5d0d60e94a5.exe winlog.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7505b3af707679b4ef5dd5d0d60e94a5.exe"C:\Users\Admin\AppData\Local\Temp\7505b3af707679b4ef5dd5d0d60e94a5.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im SkypeClient.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3508 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im 360tray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2468 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im 360Safe.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2836 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /f /im Skype.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:532 -
C:\WINDOWS\Help\winlog.exe"C:\WINDOWS\Help\winlog.exe"2⤵
- Executes dropped EXE
PID:2908
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\Help\winlog.exeFilesize
14KB
MD543ba3c9dc1d49506fa03c4afafdea02e
SHA1b3e54cec2a283acd9a40a8ba239714d809badf1f
SHA256d6f1b2d93e6a3972fa4497e7287f8022609babded2319e5e974beb7e874c8521
SHA5124548901f85c1f70c3cd3718861805cb947044bd63b1e1a9f763ed10c2e86002acf31102557537341f1fc33673273aceebb355bbee586b5015f934b515324c24a
-
memory/2180-0-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB
-
memory/2180-1-0x0000000000400000-0x000000000041D000-memory.dmpFilesize
116KB