Analysis
-
max time kernel
142s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
7835523fb2325446824091b9b51eb428.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7835523fb2325446824091b9b51eb428.exe
Resource
win10v2004-20231222-en
General
-
Target
7835523fb2325446824091b9b51eb428.exe
-
Size
2.7MB
-
MD5
7835523fb2325446824091b9b51eb428
-
SHA1
bb7c7b7a38281dd5c8d3ca7e688b4d497ac74888
-
SHA256
2e54b3cd5a16b72d15a495353764944a3ae251ae147833bddf1f09ac8608d9c7
-
SHA512
92aac0b49362618ba73093365e7eaea3e467a20330a89114bc7aa16074b1a734a184bb2d1c3381233de1443124d07050b2853bdba7da8abbcf5c2e3f82db4cb3
-
SSDEEP
49152:k2kJaM0/ILhHD0xpruRN9uM5QBKLfniPUnrudY/ktspwJkbO9JvD+vW8Y/a+:paaMIIKxpruRzuUQB2sUnrudY/sewSOf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 7835523fb2325446824091b9b51eb428.tmp -
Executes dropped EXE 2 IoCs
pid Process 4224 7835523fb2325446824091b9b51eb428.tmp 3716 rkverify.exe -
Loads dropped DLL 4 IoCs
pid Process 4224 7835523fb2325446824091b9b51eb428.tmp 4224 7835523fb2325446824091b9b51eb428.tmp 3716 rkverify.exe 4224 7835523fb2325446824091b9b51eb428.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3716 rkverify.exe 3716 rkverify.exe 3716 rkverify.exe 3716 rkverify.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3716 rkverify.exe 3716 rkverify.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 640 wrote to memory of 4224 640 7835523fb2325446824091b9b51eb428.exe 88 PID 640 wrote to memory of 4224 640 7835523fb2325446824091b9b51eb428.exe 88 PID 640 wrote to memory of 4224 640 7835523fb2325446824091b9b51eb428.exe 88 PID 4224 wrote to memory of 3716 4224 7835523fb2325446824091b9b51eb428.tmp 90 PID 4224 wrote to memory of 3716 4224 7835523fb2325446824091b9b51eb428.tmp 90 PID 4224 wrote to memory of 3716 4224 7835523fb2325446824091b9b51eb428.tmp 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\7835523fb2325446824091b9b51eb428.exe"C:\Users\Admin\AppData\Local\Temp\7835523fb2325446824091b9b51eb428.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\is-7CTQB.tmp\7835523fb2325446824091b9b51eb428.tmp"C:\Users\Admin\AppData\Local\Temp\is-7CTQB.tmp\7835523fb2325446824091b9b51eb428.tmp" /SL5="$B0050,2463795,50688,C:\Users\Admin\AppData\Local\Temp\7835523fb2325446824091b9b51eb428.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\is-35Q1A.tmp\rkverify.exe"C:\Users\Admin\AppData\Local\Temp\is-35Q1A.tmp\rkverify.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3716
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5580d9673e5ec5d90de1f83e2fd1742c2
SHA10dd94bcc3dc39097bf4bea145356e398665dda4f
SHA256868b1aee31c6335a5fc4257f20346e2d99fbd86bc7554b415da41fc19b13b3b1
SHA512f31f651034ccdaa7ed0bc134186ec56a687495ebf4888fc0d538457684b9f4dbb1b63f38f5881af929ef41e7a4f5d2820e0301118d79e32c4b3c1f1fdef9696b
-
Filesize
13KB
MD5a813d18268affd4763dde940246dc7e5
SHA1c7366e1fd925c17cc6068001bd38eaef5b42852f
SHA256e19781aabe466dd8779cb9c8fa41bbb73375447066bb34e876cf388a6ed63c64
SHA512b310ed4cd2e94381c00a6a370fcb7cc867ebe425d705b69caaaaffdafbab91f72d357966916053e72e68ecf712f2af7585500c58bb53ec3e1d539179fcb45fb4
-
Filesize
236KB
MD513a90680100cd1dd6e49bb3c8982b671
SHA111cd205b2d87a595bbd762ba34e6f85cc7dbced5
SHA256cc93832d7ebdbe3179c883ec56c7f04122512143910b5b091e01cd63c9a4438e
SHA5120283436e103c02f6ffac99fa4ec4824373c7e77f8627cc4812354ee51029187d446ed98fb1f1f0f204d1d63eaa377e0f7c9511360c213c76662b8a9e25939c51
-
Filesize
666KB
MD5022a62afadf6ad59a82329273c6db50d
SHA175202f050bbb8986dda9f0f665b5d56bcc48690d
SHA256e7bf684865dfef9a1cec9925259087a361a98fbedbfe6c4e9e0066299c7fbf58
SHA51201a7ef5ef722774c96f23d17c30884745ae01ebc54017b404408dd86b02ce399595e1d15f6eb5d55c1876aff6a78fd07bde13e9559c07ab659a00cbf7275dd09