Analysis
-
max time kernel
143s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27-01-2024 09:06
Static task
static1
Behavioral task
behavioral1
Sample
79d44a318b1e4343349ace466c13ea99.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
79d44a318b1e4343349ace466c13ea99.exe
Resource
win10v2004-20231215-en
General
-
Target
79d44a318b1e4343349ace466c13ea99.exe
-
Size
3.3MB
-
MD5
79d44a318b1e4343349ace466c13ea99
-
SHA1
a2861162cec857794011d0e0df02796ef7b0d23d
-
SHA256
2b35c8fb948bd39cda909fe4542f3c4aa6391db02c524090d9d2b052c5f2ea81
-
SHA512
cc1d320a6843ab8bab58a11e4618157d21cac30e933f5277d218ceb06e5c61f16ee49f0998b8f6efa22dc0ab52411a7aa2d5fccc792cd8dcb51d7e800f7692ad
-
SSDEEP
384:H7iMxz0CYEmqd+1F8TQ2llSSK5dNa17bKNmHfhib0NmXBaaSmqiJh3Nek+vDp:H0CYjqdS2TQOO3+bkmHobJ8a3qiJi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 79d44a318b1e4343349ace466c13ea99.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\WINDOWS\\services.exe" reg.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\WINDOWS\services.exe 79d44a318b1e4343349ace466c13ea99.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 4420 reg.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3052 wrote to memory of 4420 3052 79d44a318b1e4343349ace466c13ea99.exe 90 PID 3052 wrote to memory of 4420 3052 79d44a318b1e4343349ace466c13ea99.exe 90 PID 3052 wrote to memory of 4420 3052 79d44a318b1e4343349ace466c13ea99.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\79d44a318b1e4343349ace466c13ea99.exe"C:\Users\Admin\AppData\Local\Temp\79d44a318b1e4343349ace466c13ea99.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add hklm\software\microsoft\windows\currentversion\run /v Windows /d C:\WINDOWS\services.exe /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:4420
-