Analysis
-
max time kernel
92s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 12:41
Behavioral task
behavioral1
Sample
7fdca228f530ae88c78f42fc11fc0ed6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7fdca228f530ae88c78f42fc11fc0ed6.exe
Resource
win10v2004-20231222-en
General
-
Target
7fdca228f530ae88c78f42fc11fc0ed6.exe
-
Size
78KB
-
MD5
7fdca228f530ae88c78f42fc11fc0ed6
-
SHA1
32306f4dae3192877bde527f0fd60ba53a8d13ff
-
SHA256
fc132a4af19bc2ccbecde63f73a483aff96df428e7025b072cadbb30314a69fe
-
SHA512
36031a90f9fcdfed567d2086d43835a835a5b734c875d28cf9973a9f220e0ebab5334be5e736ab1385a8c29c3790d6a2f61d6bf3e0d522470c51dfd67d083bec
-
SSDEEP
1536:kW346xnCfsj683DHISmEUC6LOrUl2FFtA92x0ZMC8yOKn2Bo6T7pEBS:kWI65v6ar0EUNOrUe2aiMC8En47pEE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 7fdca228f530ae88c78f42fc11fc0ed6.exe -
Executes dropped EXE 1 IoCs
pid Process 2400 Y53yd1JH.exe -
resource yara_rule behavioral2/memory/2204-0-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2204-2-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/files/0x00080000000231fe-7.dat upx behavioral2/memory/2400-12-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\Y53yd1JH.exe 7fdca228f530ae88c78f42fc11fc0ed6.exe File opened for modification C:\Windows\SysWOW64\Y53yd1JH.exe 7fdca228f530ae88c78f42fc11fc0ed6.exe File created C:\Windows\SysWOW64\Y53yd1JH.exe Y53yd1JH.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2204 7fdca228f530ae88c78f42fc11fc0ed6.exe Token: SeIncBasePriorityPrivilege 2400 Y53yd1JH.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2400 2204 7fdca228f530ae88c78f42fc11fc0ed6.exe 96 PID 2204 wrote to memory of 2400 2204 7fdca228f530ae88c78f42fc11fc0ed6.exe 96 PID 2204 wrote to memory of 2400 2204 7fdca228f530ae88c78f42fc11fc0ed6.exe 96 PID 2204 wrote to memory of 3528 2204 7fdca228f530ae88c78f42fc11fc0ed6.exe 98 PID 2204 wrote to memory of 3528 2204 7fdca228f530ae88c78f42fc11fc0ed6.exe 98 PID 2204 wrote to memory of 3528 2204 7fdca228f530ae88c78f42fc11fc0ed6.exe 98 PID 2400 wrote to memory of 780 2400 Y53yd1JH.exe 97 PID 2400 wrote to memory of 780 2400 Y53yd1JH.exe 97 PID 2400 wrote to memory of 780 2400 Y53yd1JH.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fdca228f530ae88c78f42fc11fc0ed6.exe"C:\Users\Admin\AppData\Local\Temp\7fdca228f530ae88c78f42fc11fc0ed6.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\Y53yd1JH.exe"C:\Windows\system32\Y53yd1JH.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Windows\SysWOW64\Y53yd1JH.exe > nul3⤵PID:780
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\7FDCA2~1.EXE > nul2⤵PID:3528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD57fdca228f530ae88c78f42fc11fc0ed6
SHA132306f4dae3192877bde527f0fd60ba53a8d13ff
SHA256fc132a4af19bc2ccbecde63f73a483aff96df428e7025b072cadbb30314a69fe
SHA51236031a90f9fcdfed567d2086d43835a835a5b734c875d28cf9973a9f220e0ebab5334be5e736ab1385a8c29c3790d6a2f61d6bf3e0d522470c51dfd67d083bec