Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 22:18
Static task
static1
Behavioral task
behavioral1
Sample
87ce6acb8c10ab94532213a9ecaa73b8.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
87ce6acb8c10ab94532213a9ecaa73b8.exe
Resource
win10v2004-20231222-en
General
-
Target
87ce6acb8c10ab94532213a9ecaa73b8.exe
-
Size
181KB
-
MD5
87ce6acb8c10ab94532213a9ecaa73b8
-
SHA1
29e88ebd0194eef9726bb029a0c19f100f2b65d3
-
SHA256
d3a3fdc18d9ef5556faa90e1b6a294375e38babb76eae901a2d2aef9bb0bac93
-
SHA512
0a1c6eab0f71c238dd9942b0cc2bb6c93aa8c7acb08a7e544aea6188e829e5269cd0bb889a303d1dfe0d0c36bcbd5b4c87f0cc07cc473bcac70ad3d594cbd9e9
-
SSDEEP
3072:/WoSuOuJROh8UJ+1DETPskqS7tUULOWKLcDIsuLtmh0x/E:/WogYUJ+1qsToOWKLcXuhhE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation launcher.exe -
Executes dropped EXE 4 IoCs
pid Process 4708 launcher.exe 380 svchost.exe 5036 svchost.exe 3244 svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\Common Files\launcher.exe 87ce6acb8c10ab94532213a9ecaa73b8.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\help\svchost.exe launcher.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ launcher.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe 5036 svchost.exe 5036 svchost.exe 3244 svchost.exe 3244 svchost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4616 wrote to memory of 4708 4616 87ce6acb8c10ab94532213a9ecaa73b8.exe 84 PID 4616 wrote to memory of 4708 4616 87ce6acb8c10ab94532213a9ecaa73b8.exe 84 PID 4616 wrote to memory of 4708 4616 87ce6acb8c10ab94532213a9ecaa73b8.exe 84 PID 4708 wrote to memory of 380 4708 launcher.exe 88 PID 4708 wrote to memory of 380 4708 launcher.exe 88 PID 4708 wrote to memory of 380 4708 launcher.exe 88 PID 4708 wrote to memory of 3244 4708 launcher.exe 90 PID 4708 wrote to memory of 3244 4708 launcher.exe 90 PID 4708 wrote to memory of 3244 4708 launcher.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\87ce6acb8c10ab94532213a9ecaa73b8.exe"C:\Users\Admin\AppData\Local\Temp\87ce6acb8c10ab94532213a9ecaa73b8.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Program Files (x86)\Common Files\launcher.exe"C:\Program Files (x86)\Common Files\launcher.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\help\svchost.exe"C:\Windows\help\svchost.exe" install3⤵
- Executes dropped EXE
PID:380
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3244
-
-
-
C:\Windows\help\svchost.exeC:\Windows\help\svchost.exe kernel1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5036
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5d01cb27bf3acd20412962c2bfbc982cd
SHA17dcef2a78e8bec1b63cba8b890e73cbf9127d2f0
SHA256accd6b008ad614e9d84db94b9953a947fc6ea64c4348dfffea575eb146844e22
SHA512c2e2005b3fc45ec97aa1038513705c16cbab51f674fa5e869d86bc40243a90129dd16a85b658f087540e9d2cb74bc4b5d1885b168c6952a50dbb30abe7d740e6
-
Filesize
83KB
MD5343c54b7e33f5d91d2ccf9a5083a68e1
SHA16c75cf50d7e2dfd31774ac4925c95545357efbbb
SHA25619c505af7dec8fcf6aaf29fef663a8f0de858ffa7cc404125a7d59a728ffc071
SHA5128d342e38562b4ccd72d6faae73795aac6f4d5ee4be27ebcb087c13be5555414efabebb5b5749d5c97b65aa0b17dadce99c390acc7766013f05bd0e9f5afbd220