Analysis
-
max time kernel
40s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01/02/2024, 07:14
Behavioral task
behavioral1
Sample
86447b80427974862f7388efe8675133.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
86447b80427974862f7388efe8675133.exe
Resource
win10v2004-20231215-en
General
-
Target
86447b80427974862f7388efe8675133.exe
-
Size
419KB
-
MD5
86447b80427974862f7388efe8675133
-
SHA1
5a8cbb5771ac82fb0eba1a886ae0357581277f6f
-
SHA256
39b8cc32d4614148aa546ff23f1eec042e916f34b5a8501ffe3364a319fd8fbb
-
SHA512
a6aa76330516f23be1939b6662f6f6b059d45b955ba0756be9daa163ff4b386a2dc3f4587d5a2b62018c12adfe7c10373568ae2bcebcc33c8232561b399d6681
-
SSDEEP
12288:7jtju6APFo38dPbUpLbQJNBWQ4m7ooX1w:rAPq3SbUeXT7oO1
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 86447b80427974862f7388efe8675133.exe -
Executes dropped EXE 2 IoCs
pid Process 228 mplayer2.exe 3624 mplayer2.exe -
resource yara_rule behavioral2/memory/2432-0-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral2/memory/2432-1-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral2/memory/2432-13-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral2/memory/3292-15-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3292-12-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3292-10-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/files/0x000600000002323e-22.dat upx behavioral2/files/0x000600000002323e-28.dat upx behavioral2/memory/228-29-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral2/memory/3292-30-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/files/0x000600000002323e-27.dat upx behavioral2/memory/228-31-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral2/memory/3624-45-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3624-48-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3624-47-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/228-44-0x0000000000400000-0x00000000004FE000-memory.dmp upx behavioral2/files/0x000600000002323e-42.dat upx behavioral2/memory/3624-57-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3624-59-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3624-60-0x0000000000400000-0x0000000000437000-memory.dmp upx behavioral2/memory/3624-61-0x0000000000400000-0x0000000000437000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\wmplayer = "c:\\windows\\system32messengerplus\\mplayer2.exe" 86447b80427974862f7388efe8675133.exe -
AutoIT Executable 4 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2432-1-0x0000000000400000-0x00000000004FE000-memory.dmp autoit_exe behavioral2/memory/2432-13-0x0000000000400000-0x00000000004FE000-memory.dmp autoit_exe behavioral2/memory/228-31-0x0000000000400000-0x00000000004FE000-memory.dmp autoit_exe behavioral2/memory/228-44-0x0000000000400000-0x00000000004FE000-memory.dmp autoit_exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2432 set thread context of 3292 2432 86447b80427974862f7388efe8675133.exe 92 PID 228 set thread context of 3624 228 mplayer2.exe 95 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32MessengerPlus 86447b80427974862f7388efe8675133.exe File created \??\c:\windows\system32messengerplus\mplayer2.exe 86447b80427974862f7388efe8675133.exe File opened for modification \??\c:\windows\system32messengerplus\mplayer2.exe 86447b80427974862f7388efe8675133.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Software\Microsoft\Internet Explorer\Download 86447b80427974862f7388efe8675133.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" 86447b80427974862f7388efe8675133.exe Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Internet Explorer\Download\RunInvalidSignatures = "00000001" 86447b80427974862f7388efe8675133.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3292 86447b80427974862f7388efe8675133.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe 3624 mplayer2.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3292 86447b80427974862f7388efe8675133.exe 3624 mplayer2.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2432 wrote to memory of 3292 2432 86447b80427974862f7388efe8675133.exe 92 PID 2432 wrote to memory of 3292 2432 86447b80427974862f7388efe8675133.exe 92 PID 2432 wrote to memory of 3292 2432 86447b80427974862f7388efe8675133.exe 92 PID 2432 wrote to memory of 3292 2432 86447b80427974862f7388efe8675133.exe 92 PID 2432 wrote to memory of 3292 2432 86447b80427974862f7388efe8675133.exe 92 PID 3292 wrote to memory of 228 3292 86447b80427974862f7388efe8675133.exe 93 PID 3292 wrote to memory of 228 3292 86447b80427974862f7388efe8675133.exe 93 PID 3292 wrote to memory of 228 3292 86447b80427974862f7388efe8675133.exe 93 PID 228 wrote to memory of 3624 228 mplayer2.exe 95 PID 228 wrote to memory of 3624 228 mplayer2.exe 95 PID 228 wrote to memory of 3624 228 mplayer2.exe 95 PID 228 wrote to memory of 3624 228 mplayer2.exe 95 PID 228 wrote to memory of 3624 228 mplayer2.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\86447b80427974862f7388efe8675133.exe"C:\Users\Admin\AppData\Local\Temp\86447b80427974862f7388efe8675133.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\86447b80427974862f7388efe8675133.exe"C:\Users\Admin\AppData\Local\Temp\86447b80427974862f7388efe8675133.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\windows\system32messengerplus\mplayer2.exe"C:\windows\system32messengerplus\mplayer2.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:228 -
C:\windows\system32messengerplus\mplayer2.exe"C:\windows\system32messengerplus\mplayer2.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3624
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD58d079185f12af41b56fffcc002dc12a4
SHA1ff644a414295c18d730a2c747fa941fe227d8ba9
SHA256cf98fcb82bb403af7467ef6029298aacc064b32f105e4e110200bf7346ff8ae9
SHA512c8e25aa47ae8b4966fbfb8590b065eb27c5de2d690f4614a1d476087d9ba1b13feae5b0f25bdb924d74b659091add841cc967279d66e7a30d0eb06bf4e70ac89
-
Filesize
162KB
MD551054bd7f568378fa9d440857548e6ba
SHA1f2fe2a99a333002fb14010ce67fccbe277fa53ca
SHA2567bdf58bc9200d908f135417b66ef1bf4cc3cfaabde9e25dc705899e02cbb9d3f
SHA512aede390a8c07f4e0a73e7c8808cda55e5ee0a781d7fe00a1954392f81740d83175659cc86a47700e232fe5dcffa09c5c97162fcbd44319d369dc21d3703026c2
-
Filesize
190KB
MD57bdc7cc7049e79c6dc10863bc546e63d
SHA14c65c588ab226672cdfa0f6fe4a178e307101198
SHA25684002537e333205f39684ba251056c9622cf3b26c2e36249676a76467fbe5424
SHA512144ca7ebc9079439aa6afd808de95ffa5acfc68b8397c3a09c4a27aea85c6aa8afd61cb1d469be99ff0881fcf014e8b90b8ae7817889532242e2f6dd646f9d2a
-
Filesize
135KB
MD5eacc3dfdb038d61edd9636244b52946d
SHA1185811b32b8261ccfbec15205009cc6563f2fd7f
SHA256cc4eb614e719c64bed903047f0e878363a9c938804a626fc395ff445d247e729
SHA51201614fee3ab7aa568688873c53d7024ce751981c7529ff49e654db0571f8df1f48a0e90f725029e9e0ee6803ead5e2bf3bdcb32db1a30cf96f4387b383bbf9ae
-
Filesize
99KB
MD5f2ff6d7f17748944aed58c407f34378b
SHA103815fd59da07e11ddadb7e34f1097d644b5f8ce
SHA256ee34300e39794d5dbab918d993c196ee823746d246122bcb4a63a8e7d012038b
SHA512fc2b6731343cbda7a88ae2661a77cf2a16fc0e8e2cc89cf6a51eb0431a4340d5811ee42ee63be0f5c4c24dce7f170de9063d44374b8c411c72f03af0cf5b3f6c