Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 22:41
Static task
static1
Behavioral task
behavioral1
Sample
8d8a91ca1a1fd6b1290a1b36faa3f38e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8d8a91ca1a1fd6b1290a1b36faa3f38e.exe
Resource
win10v2004-20231222-en
General
-
Target
8d8a91ca1a1fd6b1290a1b36faa3f38e.exe
-
Size
228KB
-
MD5
8d8a91ca1a1fd6b1290a1b36faa3f38e
-
SHA1
89793ede16e404fe5ffd005443d0d592994bef81
-
SHA256
c2639cf64aa94d5e26fadbd96432933c69622a9a7656539cf98655ea224948ea
-
SHA512
114bae065af836c4b23201cce10827c72485326175925e1594a124e5ae06280c43cc3cff254eac1b05a55e0dd2de0bc11270f9c0f1dd041a32714ff49bda2c4e
-
SSDEEP
3072:GgBwBbgWRyy+yvygwkovTD9JADB5r0+ybMCkEpPapkbUI9wd8Ld3xoe:ObgWRO5kieBub4/EppAyw2Ld36
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe -
Executes dropped EXE 2 IoCs
pid Process 4804 svchost.exe 3028 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\V: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4756 set thread context of 2236 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 85 PID 4804 set thread context of 3028 4804 svchost.exe 90 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 4804 svchost.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4756 wrote to memory of 2236 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 85 PID 4756 wrote to memory of 2236 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 85 PID 4756 wrote to memory of 2236 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 85 PID 4756 wrote to memory of 2236 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 85 PID 4756 wrote to memory of 2236 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 85 PID 4756 wrote to memory of 2236 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 85 PID 4756 wrote to memory of 2236 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 85 PID 4756 wrote to memory of 2236 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 85 PID 4756 wrote to memory of 2236 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 85 PID 4756 wrote to memory of 2236 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 85 PID 4756 wrote to memory of 2236 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 85 PID 4756 wrote to memory of 2236 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 85 PID 4756 wrote to memory of 2236 4756 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 85 PID 2236 wrote to memory of 4804 2236 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 89 PID 2236 wrote to memory of 4804 2236 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 89 PID 2236 wrote to memory of 4804 2236 8d8a91ca1a1fd6b1290a1b36faa3f38e.exe 89 PID 4804 wrote to memory of 3028 4804 svchost.exe 90 PID 4804 wrote to memory of 3028 4804 svchost.exe 90 PID 4804 wrote to memory of 3028 4804 svchost.exe 90 PID 4804 wrote to memory of 3028 4804 svchost.exe 90 PID 4804 wrote to memory of 3028 4804 svchost.exe 90 PID 4804 wrote to memory of 3028 4804 svchost.exe 90 PID 4804 wrote to memory of 3028 4804 svchost.exe 90 PID 4804 wrote to memory of 3028 4804 svchost.exe 90 PID 4804 wrote to memory of 3028 4804 svchost.exe 90 PID 4804 wrote to memory of 3028 4804 svchost.exe 90 PID 4804 wrote to memory of 3028 4804 svchost.exe 90 PID 4804 wrote to memory of 3028 4804 svchost.exe 90 PID 4804 wrote to memory of 3028 4804 svchost.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\8d8a91ca1a1fd6b1290a1b36faa3f38e.exe"C:\Users\Admin\AppData\Local\Temp\8d8a91ca1a1fd6b1290a1b36faa3f38e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\8d8a91ca1a1fd6b1290a1b36faa3f38e.exe"C:\Users\Admin\AppData\Local\Temp\8d8a91ca1a1fd6b1290a1b36faa3f38e.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"4⤵
- Executes dropped EXE
- Enumerates connected drives
PID:3028
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
228KB
MD58d8a91ca1a1fd6b1290a1b36faa3f38e
SHA189793ede16e404fe5ffd005443d0d592994bef81
SHA256c2639cf64aa94d5e26fadbd96432933c69622a9a7656539cf98655ea224948ea
SHA512114bae065af836c4b23201cce10827c72485326175925e1594a124e5ae06280c43cc3cff254eac1b05a55e0dd2de0bc11270f9c0f1dd041a32714ff49bda2c4e