Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 11:37
Static task
static1
Behavioral task
behavioral1
Sample
7a238546ba438a42789cf5d6bd08a03f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a238546ba438a42789cf5d6bd08a03f.exe
Resource
win10v2004-20231215-en
General
-
Target
7a238546ba438a42789cf5d6bd08a03f.exe
-
Size
284KB
-
MD5
7a238546ba438a42789cf5d6bd08a03f
-
SHA1
1bb68ee98e317203f4df9b2195533350f58cd0be
-
SHA256
162d39f277d19f7692d6b420640502debe9327573bdc1d8402d127d94bd98e69
-
SHA512
be80c3fce348b918dfae6788725869204d4b1d4511b1dded700fa0abd09e88997daa1e968569a7edb42cb648841da6bc9149c6d6ffae9e62b0cf5f4050684977
-
SSDEEP
3072:ztM6vm1mgc3EPAJjCE/o2LA4qcw5bGIT5eNXy:5E1mgc3EPAJ2L0qZbGINely
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 7a238546ba438a42789cf5d6bd08a03f.exe -
Executes dropped EXE 7 IoCs
pid Process 4072 winlogon.exe 384 winlogon.exe 1428 winlogon.exe 1856 winlogon.exe 2076 winlogon.exe 4428 winlogon.exe 3464 winlogon.exe -
resource yara_rule behavioral2/memory/2068-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2068-3-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2068-4-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/2068-15-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/384-28-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/384-34-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/384-40-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/384-46-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral2/memory/384-52-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 4032 set thread context of 2068 4032 7a238546ba438a42789cf5d6bd08a03f.exe 89 PID 4072 set thread context of 384 4072 winlogon.exe 94 PID 384 set thread context of 1428 384 winlogon.exe 95 PID 384 set thread context of 1856 384 winlogon.exe 107 PID 384 set thread context of 2076 384 winlogon.exe 110 PID 384 set thread context of 4428 384 winlogon.exe 113 PID 384 set thread context of 3464 384 winlogon.exe 116 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 724 1428 WerFault.exe 95 4436 1856 WerFault.exe 107 4172 2076 WerFault.exe 110 4716 4428 WerFault.exe 113 4028 3464 WerFault.exe 116 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2068 7a238546ba438a42789cf5d6bd08a03f.exe 384 winlogon.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4032 wrote to memory of 4932 4032 7a238546ba438a42789cf5d6bd08a03f.exe 87 PID 4032 wrote to memory of 4932 4032 7a238546ba438a42789cf5d6bd08a03f.exe 87 PID 4032 wrote to memory of 4932 4032 7a238546ba438a42789cf5d6bd08a03f.exe 87 PID 4032 wrote to memory of 2068 4032 7a238546ba438a42789cf5d6bd08a03f.exe 89 PID 4032 wrote to memory of 2068 4032 7a238546ba438a42789cf5d6bd08a03f.exe 89 PID 4032 wrote to memory of 2068 4032 7a238546ba438a42789cf5d6bd08a03f.exe 89 PID 4032 wrote to memory of 2068 4032 7a238546ba438a42789cf5d6bd08a03f.exe 89 PID 4032 wrote to memory of 2068 4032 7a238546ba438a42789cf5d6bd08a03f.exe 89 PID 4032 wrote to memory of 2068 4032 7a238546ba438a42789cf5d6bd08a03f.exe 89 PID 4032 wrote to memory of 2068 4032 7a238546ba438a42789cf5d6bd08a03f.exe 89 PID 4032 wrote to memory of 2068 4032 7a238546ba438a42789cf5d6bd08a03f.exe 89 PID 2068 wrote to memory of 4072 2068 7a238546ba438a42789cf5d6bd08a03f.exe 92 PID 2068 wrote to memory of 4072 2068 7a238546ba438a42789cf5d6bd08a03f.exe 92 PID 2068 wrote to memory of 4072 2068 7a238546ba438a42789cf5d6bd08a03f.exe 92 PID 4072 wrote to memory of 1808 4072 winlogon.exe 93 PID 4072 wrote to memory of 1808 4072 winlogon.exe 93 PID 4072 wrote to memory of 1808 4072 winlogon.exe 93 PID 4072 wrote to memory of 384 4072 winlogon.exe 94 PID 4072 wrote to memory of 384 4072 winlogon.exe 94 PID 4072 wrote to memory of 384 4072 winlogon.exe 94 PID 4072 wrote to memory of 384 4072 winlogon.exe 94 PID 4072 wrote to memory of 384 4072 winlogon.exe 94 PID 4072 wrote to memory of 384 4072 winlogon.exe 94 PID 4072 wrote to memory of 384 4072 winlogon.exe 94 PID 4072 wrote to memory of 384 4072 winlogon.exe 94 PID 384 wrote to memory of 1428 384 winlogon.exe 95 PID 384 wrote to memory of 1428 384 winlogon.exe 95 PID 384 wrote to memory of 1428 384 winlogon.exe 95 PID 384 wrote to memory of 1428 384 winlogon.exe 95 PID 384 wrote to memory of 1428 384 winlogon.exe 95 PID 384 wrote to memory of 1428 384 winlogon.exe 95 PID 384 wrote to memory of 1428 384 winlogon.exe 95 PID 384 wrote to memory of 1428 384 winlogon.exe 95 PID 384 wrote to memory of 1856 384 winlogon.exe 107 PID 384 wrote to memory of 1856 384 winlogon.exe 107 PID 384 wrote to memory of 1856 384 winlogon.exe 107 PID 384 wrote to memory of 1856 384 winlogon.exe 107 PID 384 wrote to memory of 1856 384 winlogon.exe 107 PID 384 wrote to memory of 1856 384 winlogon.exe 107 PID 384 wrote to memory of 1856 384 winlogon.exe 107 PID 384 wrote to memory of 1856 384 winlogon.exe 107 PID 384 wrote to memory of 2076 384 winlogon.exe 110 PID 384 wrote to memory of 2076 384 winlogon.exe 110 PID 384 wrote to memory of 2076 384 winlogon.exe 110 PID 384 wrote to memory of 2076 384 winlogon.exe 110 PID 384 wrote to memory of 2076 384 winlogon.exe 110 PID 384 wrote to memory of 2076 384 winlogon.exe 110 PID 384 wrote to memory of 2076 384 winlogon.exe 110 PID 384 wrote to memory of 2076 384 winlogon.exe 110 PID 384 wrote to memory of 4428 384 winlogon.exe 113 PID 384 wrote to memory of 4428 384 winlogon.exe 113 PID 384 wrote to memory of 4428 384 winlogon.exe 113 PID 384 wrote to memory of 4428 384 winlogon.exe 113 PID 384 wrote to memory of 4428 384 winlogon.exe 113 PID 384 wrote to memory of 4428 384 winlogon.exe 113 PID 384 wrote to memory of 4428 384 winlogon.exe 113 PID 384 wrote to memory of 4428 384 winlogon.exe 113 PID 384 wrote to memory of 3464 384 winlogon.exe 116 PID 384 wrote to memory of 3464 384 winlogon.exe 116 PID 384 wrote to memory of 3464 384 winlogon.exe 116 PID 384 wrote to memory of 3464 384 winlogon.exe 116 PID 384 wrote to memory of 3464 384 winlogon.exe 116 PID 384 wrote to memory of 3464 384 winlogon.exe 116 PID 384 wrote to memory of 3464 384 winlogon.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a238546ba438a42789cf5d6bd08a03f.exe"C:\Users\Admin\AppData\Local\Temp\7a238546ba438a42789cf5d6bd08a03f.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:4932
-
-
C:\Users\Admin\AppData\Local\Temp\7a238546ba438a42789cf5d6bd08a03f.exe
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:1808
-
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:1428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 126⤵
- Program crash
PID:724
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:1856 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1856 -s 126⤵
- Program crash
PID:4436
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 126⤵
- Program crash
PID:4172
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:4428 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4428 -s 126⤵
- Program crash
PID:4716
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:3464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3464 -s 126⤵
- Program crash
PID:4028
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1428 -ip 14281⤵PID:3084
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 472 -p 1856 -ip 18561⤵PID:3240
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 2076 -ip 20761⤵PID:4292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 4428 -ip 44281⤵PID:2404
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3464 -ip 34641⤵PID:560
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD57a238546ba438a42789cf5d6bd08a03f
SHA11bb68ee98e317203f4df9b2195533350f58cd0be
SHA256162d39f277d19f7692d6b420640502debe9327573bdc1d8402d127d94bd98e69
SHA512be80c3fce348b918dfae6788725869204d4b1d4511b1dded700fa0abd09e88997daa1e968569a7edb42cb648841da6bc9149c6d6ffae9e62b0cf5f4050684977