Analysis
-
max time kernel
145s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
85bc2e8133ed78631bab10a4af9468bb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
85bc2e8133ed78631bab10a4af9468bb.exe
Resource
win10v2004-20231222-en
General
-
Target
85bc2e8133ed78631bab10a4af9468bb.exe
-
Size
11KB
-
MD5
85bc2e8133ed78631bab10a4af9468bb
-
SHA1
1c409c5ec7fef0b3846a55e78b3a10fffdc4c0db
-
SHA256
6206ac68cac9a9604d95e1b51751e9d369f6777d78fdf54005edd0a4eac8feaf
-
SHA512
e93d176734bb091c31bfbb0943fdfc8401cdcaa1281ef4ba2f6e47a176c38fe7d1c4215339b2c4642236548dc75fbbf28491e0a78097b9f87c9b272837a493d7
-
SSDEEP
192:3ZH+V+cXezwP+OKrG1B141KLQpVgd6VHvk:Z+IcXeUPSrCB1sKLQpVgMHM
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 85bc2e8133ed78631bab10a4af9468bb.exe -
Executes dropped EXE 1 IoCs
pid Process 3364 winlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU Msn = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM Msn = "C:\\Users\\Admin\\AppData\\Roaming\\winlogon.exe" winlogon.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1688 wrote to memory of 3364 1688 85bc2e8133ed78631bab10a4af9468bb.exe 86 PID 1688 wrote to memory of 3364 1688 85bc2e8133ed78631bab10a4af9468bb.exe 86 PID 1688 wrote to memory of 3364 1688 85bc2e8133ed78631bab10a4af9468bb.exe 86 PID 1688 wrote to memory of 4616 1688 85bc2e8133ed78631bab10a4af9468bb.exe 87 PID 1688 wrote to memory of 4616 1688 85bc2e8133ed78631bab10a4af9468bb.exe 87 PID 1688 wrote to memory of 4616 1688 85bc2e8133ed78631bab10a4af9468bb.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\85bc2e8133ed78631bab10a4af9468bb.exe"C:\Users\Admin\AppData\Local\Temp\85bc2e8133ed78631bab10a4af9468bb.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Roaming\winlogon.exe"C:\Users\Admin\AppData\Roaming\winlogon.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\MDM45B4.tmp_melt.bat2⤵PID:4616
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD5b7761e54cd09858a285a5278ee629dd1
SHA1553c4c0f37c92a2b354cf657b3518f7b7542925b
SHA2567e61c9f15c4a2a349e87d988927ca60b8a83d0c763d619923f14ee4ce9e6f326
SHA512cedae2e43a866b7616028e8c7ccfa6730d0e300e2292a53fb04f979ab6b9f05237747953bd1d199976fb2852b0d11e610cee6c31f443a482132e38a33db08bc9
-
Filesize
11KB
MD585bc2e8133ed78631bab10a4af9468bb
SHA11c409c5ec7fef0b3846a55e78b3a10fffdc4c0db
SHA2566206ac68cac9a9604d95e1b51751e9d369f6777d78fdf54005edd0a4eac8feaf
SHA512e93d176734bb091c31bfbb0943fdfc8401cdcaa1281ef4ba2f6e47a176c38fe7d1c4215339b2c4642236548dc75fbbf28491e0a78097b9f87c9b272837a493d7