Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/01/2024, 16:14
Static task
static1
Behavioral task
behavioral1
Sample
80480df20528a22dee4ff724e155e4f0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
80480df20528a22dee4ff724e155e4f0.exe
Resource
win10v2004-20231215-en
General
-
Target
80480df20528a22dee4ff724e155e4f0.exe
-
Size
706KB
-
MD5
80480df20528a22dee4ff724e155e4f0
-
SHA1
f8d53c2693c7b0a7ec57804cfe73d518d5f858c9
-
SHA256
7c0c2c2ac8bb363c372b015c46e2bc8e57b895b0e61a7728622c0134f476cff0
-
SHA512
1a9c711da9cdf2ac26fccce16828dbf91f4c4d664c25547a462b800df005abd97f613f8950e562ce0d9ae6600773782ce69a26e10070971bfe7ce3bfbf48f82f
-
SSDEEP
12288:gp/iN/mlVdtvrYeyZJf7kPK+iqBZn+D73iKHeGsptI7FNtWS0Oam:gpQ/6trYlvYPK+lqD73TeGsptIpDWPm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 80480df20528a22dee4ff724e155e4f0.exe -
Executes dropped EXE 2 IoCs
pid Process 4688 ScrBlaze.scr 4488 ScrBlaze.scr -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\ScrBlaze.scr 80480df20528a22dee4ff724e155e4f0.exe File created C:\Windows\s18273659 ScrBlaze.scr File opened for modification C:\Windows\s18273659 ScrBlaze.scr File created C:\Windows\s18273659 ScrBlaze.scr File opened for modification C:\Windows\s18273659 ScrBlaze.scr File created C:\Windows\s18273659 80480df20528a22dee4ff724e155e4f0.exe File opened for modification C:\Windows\s18273659 80480df20528a22dee4ff724e155e4f0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\Desktop 80480df20528a22dee4ff724e155e4f0.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\Desktop\SCRNSAVE.EXE = "C:\\Windows\\ScrBlaze.scr" 80480df20528a22dee4ff724e155e4f0.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2784 80480df20528a22dee4ff724e155e4f0.exe 2784 80480df20528a22dee4ff724e155e4f0.exe 4688 ScrBlaze.scr 4688 ScrBlaze.scr 4488 ScrBlaze.scr 4488 ScrBlaze.scr -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2784 wrote to memory of 4688 2784 80480df20528a22dee4ff724e155e4f0.exe 90 PID 2784 wrote to memory of 4688 2784 80480df20528a22dee4ff724e155e4f0.exe 90 PID 2784 wrote to memory of 4688 2784 80480df20528a22dee4ff724e155e4f0.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\80480df20528a22dee4ff724e155e4f0.exe"C:\Users\Admin\AppData\Local\Temp\80480df20528a22dee4ff724e155e4f0.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies Control Panel
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\ScrBlaze.scr"C:\Windows\ScrBlaze.scr" /S2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4688
-
-
C:\Windows\ScrBlaze.scrC:\Windows\ScrBlaze.scr /s1⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:4488
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
706KB
MD580480df20528a22dee4ff724e155e4f0
SHA1f8d53c2693c7b0a7ec57804cfe73d518d5f858c9
SHA2567c0c2c2ac8bb363c372b015c46e2bc8e57b895b0e61a7728622c0134f476cff0
SHA5121a9c711da9cdf2ac26fccce16828dbf91f4c4d664c25547a462b800df005abd97f613f8950e562ce0d9ae6600773782ce69a26e10070971bfe7ce3bfbf48f82f
-
Filesize
970B
MD5015ffbb5d3b58c63460e0d9d3c8f9589
SHA14da9636f25a49740beb4e2f424fc45d7cc5947d0
SHA25677679405357e72e5496352774e32b5454396495cc473bc04b0e96f585e18efdf
SHA51243af397a386b344424bd51cd53e3e5dd36b753ff589d35f1b6c7a1dfaafc7e9a27cc3f6e38b36dad98f0a367ad53a0e22364ef5abee47049d4ccb38d58f56028