Analysis
-
max time kernel
144s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/01/2024, 12:27
Static task
static1
Behavioral task
behavioral1
Sample
775be4beb7cb3ebed0a4adfabd5535f0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
775be4beb7cb3ebed0a4adfabd5535f0.exe
Resource
win10v2004-20231222-en
General
-
Target
775be4beb7cb3ebed0a4adfabd5535f0.exe
-
Size
17KB
-
MD5
775be4beb7cb3ebed0a4adfabd5535f0
-
SHA1
9584d641d9a323a61c17bd032050eb145ffb0fed
-
SHA256
7cb6918ef396dace22a8621bcaf16f228e3d23fd14decba2c2017373afcbedc3
-
SHA512
f2d891b5fe9e3892fdabc930e79706c7476dce1d55e110017e11d11e2e9f8e74c4a14063c2d2862980fb63dc2b4477e2e904d8c7c3b54216fe1d3770dfe47646
-
SSDEEP
384:0JqXhCP0irqA0g9mpwAKedL3PGti4qF605+0lJ7utrAnXfDf:0So0iULPnl1DnPD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 775be4beb7cb3ebed0a4adfabd5535f0.exe -
Executes dropped EXE 1 IoCs
pid Process 4996 775be4beb7cb3ebed0a4adfabd5535f0.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\putil = "C:\\Windows\\775be4beb7cb3ebed0a4adfabd5535f0.exe" 775be4beb7cb3ebed0a4adfabd5535f0.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 775be4beb7cb3ebed0a4adfabd5535f0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\775be4beb7cb3ebed0a4adfabd5535f0.exe 775be4beb7cb3ebed0a4adfabd5535f0.exe File created C:\Windows\775be4beb7cb3ebed0a4adfabd5535f0.exe 775be4beb7cb3ebed0a4adfabd5535f0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2096 wrote to memory of 4996 2096 775be4beb7cb3ebed0a4adfabd5535f0.exe 86 PID 2096 wrote to memory of 4996 2096 775be4beb7cb3ebed0a4adfabd5535f0.exe 86 PID 2096 wrote to memory of 4996 2096 775be4beb7cb3ebed0a4adfabd5535f0.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\775be4beb7cb3ebed0a4adfabd5535f0.exe"C:\Users\Admin\AppData\Local\Temp\775be4beb7cb3ebed0a4adfabd5535f0.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\775be4beb7cb3ebed0a4adfabd5535f0.exe"C:\Windows\775be4beb7cb3ebed0a4adfabd5535f0.exe"2⤵
- Executes dropped EXE
- Enumerates connected drives
PID:4996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5775be4beb7cb3ebed0a4adfabd5535f0
SHA19584d641d9a323a61c17bd032050eb145ffb0fed
SHA2567cb6918ef396dace22a8621bcaf16f228e3d23fd14decba2c2017373afcbedc3
SHA512f2d891b5fe9e3892fdabc930e79706c7476dce1d55e110017e11d11e2e9f8e74c4a14063c2d2862980fb63dc2b4477e2e904d8c7c3b54216fe1d3770dfe47646