Analysis
-
max time kernel
93s -
max time network
105s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 04:21
Static task
static1
Behavioral task
behavioral1
Sample
download.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
download.exe
Resource
win10v2004-20231222-en
General
-
Target
download.exe
-
Size
203KB
-
MD5
ddc256f409bf0b8e9647497da0c02077
-
SHA1
5f17007371a209876bec6e467fbbab7634cb93b6
-
SHA256
5114a34a00f9cb4273df0778733e2ffb006f74a065ecc0e82311f6ceb8bd2e09
-
SHA512
d4d10039597dcdde99d8b25e4c5bcaad7514dc54f2296220e7fd108e02030b926943f53d2c622f8212340f48c9568dc000432a8ab83052c64c15c3bcfc4eed12
-
SSDEEP
3072:rBAp5XhKpN4eOyVTGfhEClj8jTk+0hJ8D4RD0c0rpOdt/46KC5NV/2iBY:WbXE9OiTGfhEClq9YKXcP7/UCpS
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 5 3576 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation download.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\a\222\1a8.bat download.exe File opened for modification C:\Program Files (x86)\a\222\dd11\8546f9rtrty464b17.vbs download.exe File opened for modification C:\Program Files (x86)\a\222\dd11\0a93c4e8557cb61c55ee.vbs download.exe File opened for modification C:\Program Files (x86)\a\222\dd11\kokoloda.da download.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000_Classes\Local Settings download.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3616 wrote to memory of 3148 3616 download.exe 89 PID 3616 wrote to memory of 3148 3616 download.exe 89 PID 3616 wrote to memory of 3148 3616 download.exe 89 PID 3616 wrote to memory of 3576 3616 download.exe 91 PID 3616 wrote to memory of 3576 3616 download.exe 91 PID 3616 wrote to memory of 3576 3616 download.exe 91 PID 3616 wrote to memory of 4312 3616 download.exe 92 PID 3616 wrote to memory of 4312 3616 download.exe 92 PID 3616 wrote to memory of 4312 3616 download.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\download.exe"C:\Users\Admin\AppData\Local\Temp\download.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\a\222\1a8.bat" "2⤵
- Drops file in Drivers directory
PID:3148
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\a\222\dd11\0a93c4e8557cb61c55ee.vbs"2⤵
- Blocklisted process makes network request
PID:3576
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\a\222\dd11\8546f9rtrty464b17.vbs"2⤵
- Drops file in Drivers directory
PID:4312
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5de147ce6ba1d1943dafb2e5f863516a4
SHA1a090f0df6ba6874d2d1380efcc2d471854f6d86a
SHA256df3746b241d470e51ce2d1c1c87ba8f4c1fb7598712c37b7a8bc37dd79e2378d
SHA512e197eda48fc1e720d4839f13112dec4e8bfc1932b6168e812cca8326cc9dd4b9cd583285da00d3e6bc455d11e33e015a3b134b65389f2e0eb72691315b145bba
-
Filesize
512B
MD547d274be3586757ba8e79a432db848a3
SHA14f53bd2d2308849fe993e3a475a7bccd430d5d81
SHA256bf04ec8c40ffe1281422fe5944bad405587c6ad1ee4226f85b0915c8b573add1
SHA5124b90229cd9ac8ee81c9dce0292dc3881d6d7028525e77b412e138a6fc44fa5236518c419865a093440c27dbd00bbbc58326619122138ace6c35f89b123c68175
-
Filesize
638B
MD5bb461184f044aca28b37faec5030b29a
SHA11f712dd2138a0a1c64f3da2881b22cedffa0c7a3
SHA2568869ea1e9535b4e846c39458e121b625b08781748fe004a81bd91552ddffacf8
SHA512329fdc364d6f44e67ecc17f38eafcd8a0a5315bb729d4a067779d35596ba417a3b90cdf8100dc0774ddf3fdef4a91c62ebd8f9c87bf04e55e8fef6f3052aec66
-
Filesize
91B
MD5fdf80ba0d1c8aecbe41796eda51c2ca7
SHA1f23f744f124d18444586c39f2a4eeaef5ee295a8
SHA25655e136d79fef1b1e38269f95b57c4fb4637dd4909d3765886672a820afbf5f3b
SHA512fdfa96e64551f03d79bc62612cdb1b5a3059fc7d9d77d5c5a9141cb3e3910effd98d4e6711b70a0dad8e6785a4fa3bd171f6bbd384d82285406b7e2537c2d784
-
Filesize
1KB
MD5c6594e4fa23d131279801560cd9c03ef
SHA186030f67f34df4ce02759e6f2fbbf7c98febd2da
SHA2565ac117484272642c0e251ef3f75720d91d7877828a0a0f391e6d1a29f76ccf2b
SHA512800695c666ec1d1e2c1f16abd994deaa7ef7f219b24776c4e8e74e27d6357932b78288c857a5ad03b1d8a78f3e8b8c6d9bb35493129e89dac0012a39034f7640