Analysis
-
max time kernel
136s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
27/01/2024, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
7a922c0bf516574c776dfc4e24c2e70b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7a922c0bf516574c776dfc4e24c2e70b.exe
Resource
win10v2004-20231222-en
General
-
Target
7a922c0bf516574c776dfc4e24c2e70b.exe
-
Size
1.0MB
-
MD5
7a922c0bf516574c776dfc4e24c2e70b
-
SHA1
57a2d08202e32c7c977c6f8c2b85bfe36ce30d5c
-
SHA256
9692122f93b862ecea613a1e3932763125d14ee97ccf2b42557474fc0f1f8bc3
-
SHA512
08f634630b8d6d65ea3a64331e5be3ed1d8b54be23377286e12511d45b79cc40cbb4f41d936bd48667d7acc54ceda0ea570c51357e2e1928e173e59b48d59d63
-
SSDEEP
24576:FSLXxywTtpW3KS6/CeXNdxNl6M4r0EsjE3SygIL9ERgzjq9oQCpIJJJ:GgwT3XL/fXdNkM4rejvygeBzjj9wJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 7a922c0bf516574c776dfc4e24c2e70b.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\xmWMvOLQeJ.url Disegnata.exe.com -
Executes dropped EXE 3 IoCs
pid Process 2220 Disegnata.exe.com 2176 Disegnata.exe.com 5024 RegAsm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2176 set thread context of 5024 2176 Disegnata.exe.com 106 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2188 PING.EXE -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2220 Disegnata.exe.com 2220 Disegnata.exe.com 2220 Disegnata.exe.com 2176 Disegnata.exe.com 2176 Disegnata.exe.com 2176 Disegnata.exe.com -
Suspicious use of SendNotifyMessage 6 IoCs
pid Process 2220 Disegnata.exe.com 2220 Disegnata.exe.com 2220 Disegnata.exe.com 2176 Disegnata.exe.com 2176 Disegnata.exe.com 2176 Disegnata.exe.com -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 4808 wrote to memory of 1500 4808 7a922c0bf516574c776dfc4e24c2e70b.exe 90 PID 4808 wrote to memory of 1500 4808 7a922c0bf516574c776dfc4e24c2e70b.exe 90 PID 4808 wrote to memory of 1500 4808 7a922c0bf516574c776dfc4e24c2e70b.exe 90 PID 4808 wrote to memory of 5104 4808 7a922c0bf516574c776dfc4e24c2e70b.exe 91 PID 4808 wrote to memory of 5104 4808 7a922c0bf516574c776dfc4e24c2e70b.exe 91 PID 4808 wrote to memory of 5104 4808 7a922c0bf516574c776dfc4e24c2e70b.exe 91 PID 5104 wrote to memory of 3948 5104 cmd.exe 93 PID 5104 wrote to memory of 3948 5104 cmd.exe 93 PID 5104 wrote to memory of 3948 5104 cmd.exe 93 PID 3948 wrote to memory of 3144 3948 cmd.exe 94 PID 3948 wrote to memory of 3144 3948 cmd.exe 94 PID 3948 wrote to memory of 3144 3948 cmd.exe 94 PID 3948 wrote to memory of 2220 3948 cmd.exe 95 PID 3948 wrote to memory of 2220 3948 cmd.exe 95 PID 3948 wrote to memory of 2220 3948 cmd.exe 95 PID 3948 wrote to memory of 2188 3948 cmd.exe 96 PID 3948 wrote to memory of 2188 3948 cmd.exe 96 PID 3948 wrote to memory of 2188 3948 cmd.exe 96 PID 2220 wrote to memory of 2176 2220 Disegnata.exe.com 97 PID 2220 wrote to memory of 2176 2220 Disegnata.exe.com 97 PID 2220 wrote to memory of 2176 2220 Disegnata.exe.com 97 PID 2176 wrote to memory of 5024 2176 Disegnata.exe.com 106 PID 2176 wrote to memory of 5024 2176 Disegnata.exe.com 106 PID 2176 wrote to memory of 5024 2176 Disegnata.exe.com 106 PID 2176 wrote to memory of 5024 2176 Disegnata.exe.com 106 PID 2176 wrote to memory of 5024 2176 Disegnata.exe.com 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a922c0bf516574c776dfc4e24c2e70b.exe"C:\Users\Admin\AppData\Local\Temp\7a922c0bf516574c776dfc4e24c2e70b.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\dllhost.exe"C:\Windows\System32\dllhost.exe"2⤵PID:1500
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c cmd < Udi.csv2⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\cmd.execmd3⤵
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\findstr.exefindstr /V /R "^NzJuXZttNruEDLgNZyDCWjQhljpveIbwCBJIaDqELCvYEXVpsHJBvIoBDvWKQIwyFteewGccyZQxPRIjdZtcYV$" Poi.csv4⤵PID:3144
-
-
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Disegnata.exe.comDisegnata.exe.com A4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Disegnata.exe.comC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\Disegnata.exe.com A5⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exeC:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RegAsm.exe6⤵
- Executes dropped EXE
PID:5024
-
-
-
-
C:\Windows\SysWOW64\PING.EXEping AVCIKYMG -n 304⤵
- Runs ping.exe
PID:2188
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
62KB
MD5d3efa5c74273db8b4387b93d6422f725
SHA123f0516e98bd8ab2b50192e41e2430b94e93bc57
SHA25677871c90193e16eaff1e28a6eb0ffa072891ca4c2ae06a9e84dcfad6ace2b7bf
SHA512ad488ade3109d9b45eb0a5b9cd0ceea8f28f111fe43b6900634455113fdf53cdec49d0d10d39154949c3448dcef3ba76cd096b4511d5e0fadf844f66e7271cd5
-
Filesize
872KB
MD5c56b5f0201a3b3de53e561fe76912bfd
SHA12a4062e10a5de813f5688221dbeb3f3ff33eb417
SHA256237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d
SHA512195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c
-
Filesize
1.1MB
MD569e04162e0571d897e9bccf0e7c9f472
SHA180ab7cb78b367638d2ae2656a8cd98d47a1ea80e
SHA25655296c998850b59b5b64523eef648c8b6517c20397b328cd75fc0955d2f4ba78
SHA51239df7f919ecea0f973325225fa5f633d759b3bcfb77aeecccb75da6e3faecbd35a2a24dd0fb6926d56d6af088e5e4d4f1cdbefd8846b5d95ad2673fdb82e2c3a
-
Filesize
872KB
MD5138c53e5efafd97556971c5506a5e549
SHA19835d86f95b2a68ce0f09137e79775454a8b7c49
SHA256a7410c06483129b1bad20cd8dc1f638276294488002805e2b0e226e4b2eb507e
SHA5122009c463857cc1665940a7a85167e8356367dc0191fc157e3a0f235f0d81c16046ef1651674244535f00aa97c94c770db24f9c2b3b07918c3ce995058dc72839
-
Filesize
63KB
MD50d5df43af2916f47d00c1573797c1a13
SHA1230ab5559e806574d26b4c20847c368ed55483b0
SHA256c066aee7aa3aa83f763ebc5541daa266ed6c648fbffcde0d836a13b221bb2adc
SHA512f96cf9e1890746b12daf839a6d0f16f062b72c1b8a40439f96583f242980f10f867720232a6fa0f7d4d7ac0a7a6143981a5a130d6417ea98b181447134c7cfe2
-
Filesize
409B
MD50ee240b25b327ec534137a2c47b5d2de
SHA114d6a6010f243f385c31cd015503d686dedfb527
SHA256de8552d8df835e065b0328552078bae29c845acb326332e2e4a74ba6261ee676
SHA51238f36219dcbddd95cfc79fcb1b3d51c62667656924f3c869fbe856879dcaf22accda75d6e079d7d9a6da997893f78037164cd5bf0d5672ac644c99b936d9f1de