Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 07:13
Behavioral task
behavioral1
Sample
7f377bce36f0fb85e337daee2421a252.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f377bce36f0fb85e337daee2421a252.exe
Resource
win10v2004-20231215-en
General
-
Target
7f377bce36f0fb85e337daee2421a252.exe
-
Size
13KB
-
MD5
7f377bce36f0fb85e337daee2421a252
-
SHA1
2536fb30a583d81012e87f386317ec096362c6a6
-
SHA256
a566a016e89fc9ababd27b6dc35d35a402c6e8a561660985578b3066b25e0f43
-
SHA512
ed5c726d0552ef7f168949a92c18e74006bef0a5fe733be7bcac3e9c85b5fb522f6defec21a6d0e3142be10605adc2c46b1b335122c971c79602d32be432afc7
-
SSDEEP
384:WvpF/6oNYqKxXxDHyZ3ubQKt2TghYFFdeYXP:Wxx6oJoxDH63ubXkTgmBX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 7f377bce36f0fb85e337daee2421a252.exe -
resource yara_rule behavioral2/memory/2804-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/2804-1-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/2804-3-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/2804-5-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/2804-10-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID 7f377bce36f0fb85e337daee2421a252.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl 7f377bce36f0fb85e337daee2421a252.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\multimediaControls.chl\CLSID\ = "{6BF52A52-394A-11D3-B153-00C04F79FAA6}" 7f377bce36f0fb85e337daee2421a252.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2804 7f377bce36f0fb85e337daee2421a252.exe 2804 7f377bce36f0fb85e337daee2421a252.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2692 2804 7f377bce36f0fb85e337daee2421a252.exe 92 PID 2804 wrote to memory of 2692 2804 7f377bce36f0fb85e337daee2421a252.exe 92 PID 2804 wrote to memory of 2692 2804 7f377bce36f0fb85e337daee2421a252.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f377bce36f0fb85e337daee2421a252.exe"C:\Users\Admin\AppData\Local\Temp\7f377bce36f0fb85e337daee2421a252.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wewt0.bat" "2⤵PID:2692
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274B
MD573541c95d9908af7c01f2c418649faf7
SHA108a37dd54d354d8adf9b3d18dae34f1df2985a5e
SHA25644be82eb14f5776add8df87a7ccff2bc7a3ff608ddfa72dea7ca6c0e8ad3c44b
SHA5127ceaa9c11d8aeb5a29f2fd00dfa2d99102b212a40a28aa0d654972d144772fc3ba1c9d79bca23640a0e9dd7dc7ca14aaa68e0c165745b080faee94ac5071247f