Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 10:36
Static task
static1
Behavioral task
behavioral1
Sample
7f9feda2c0547e62a4031e87884f894a.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
7f9feda2c0547e62a4031e87884f894a.exe
Resource
win10v2004-20231222-en
General
-
Target
7f9feda2c0547e62a4031e87884f894a.exe
-
Size
41KB
-
MD5
7f9feda2c0547e62a4031e87884f894a
-
SHA1
01cca3006f60fe9b8c7f93d190fe30b1349f3193
-
SHA256
7887c75b53fd530c8e9ff62984862c8999fcc0c1d2938076a803f8b5acf24200
-
SHA512
3c6b403e7b12b7a87ae2d122974385e7f864dcfa734481cac5f82f1b150c76f138df92680b7e5b2549c75d7218ee6e5b4663dfaa1c66686cfe3e6b62e189c823
-
SSDEEP
768:QGBar1ZIZYnfI9opm6AIHIjaI7g9mVmUn5oNE/W5dRV8:fW1ZIZqI9opm6AIHIjzmUiNzd
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 7f9feda2c0547e62a4031e87884f894a.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation sxhost.exe -
Executes dropped EXE 1 IoCs
pid Process 404 sxhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3452 wrote to memory of 404 3452 7f9feda2c0547e62a4031e87884f894a.exe 89 PID 3452 wrote to memory of 404 3452 7f9feda2c0547e62a4031e87884f894a.exe 89 PID 3452 wrote to memory of 404 3452 7f9feda2c0547e62a4031e87884f894a.exe 89 PID 3452 wrote to memory of 2304 3452 7f9feda2c0547e62a4031e87884f894a.exe 90 PID 3452 wrote to memory of 2304 3452 7f9feda2c0547e62a4031e87884f894a.exe 90 PID 3452 wrote to memory of 2304 3452 7f9feda2c0547e62a4031e87884f894a.exe 90 PID 404 wrote to memory of 2448 404 sxhost.exe 92 PID 404 wrote to memory of 2448 404 sxhost.exe 92 PID 404 wrote to memory of 2448 404 sxhost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f9feda2c0547e62a4031e87884f894a.exe"C:\Users\Admin\AppData\Local\Temp\7f9feda2c0547e62a4031e87884f894a.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\sxhost.exe"C:\Users\Admin\sxhost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\sxhost.exe >> NUL3⤵PID:2448
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\7F9FED~1.EXE >> NUL2⤵PID:2304
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD57f9feda2c0547e62a4031e87884f894a
SHA101cca3006f60fe9b8c7f93d190fe30b1349f3193
SHA2567887c75b53fd530c8e9ff62984862c8999fcc0c1d2938076a803f8b5acf24200
SHA5123c6b403e7b12b7a87ae2d122974385e7f864dcfa734481cac5f82f1b150c76f138df92680b7e5b2549c75d7218ee6e5b4663dfaa1c66686cfe3e6b62e189c823