Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04/02/2024, 05:25
Static task
static1
Behavioral task
behavioral1
Sample
8e52da15a8b1281d64c91f182c89cdaa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8e52da15a8b1281d64c91f182c89cdaa.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
$_3_.exe
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
$_3_.exe
Resource
win10v2004-20231215-en
General
-
Target
$_3_.exe
-
Size
1.7MB
-
MD5
d4c16982f8a834bc0f8028b45c3ae543
-
SHA1
9d9cec9af8f23a23521e20d48d9af1024663a4a7
-
SHA256
932badf8ce27381bd595c9d861d7f7142fe98f233a893a2003a5f5e5ec163b3b
-
SHA512
c94b8d978afac107c08a5405cf9510e48d4bcf1284292eee1d08898f1c7a43a83a9655dc4d85d27d3b825e45a8f136c7beb71405fab94bb5e2437b7c4ad44b5c
-
SSDEEP
49152:n7mrmYPoEHVGTWFkO4ITVpSuEqM/vrM3rA3SuN5:km2Z12WFYFVf
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation $_3_.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3340 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2972 $_3_.exe 2972 $_3_.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2972 $_3_.exe 2972 $_3_.exe 2972 $_3_.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2972 wrote to memory of 1472 2972 $_3_.exe 88 PID 2972 wrote to memory of 1472 2972 $_3_.exe 88 PID 2972 wrote to memory of 1472 2972 $_3_.exe 88 PID 1472 wrote to memory of 3340 1472 cmd.exe 90 PID 1472 wrote to memory of 3340 1472 cmd.exe 90 PID 1472 wrote to memory of 3340 1472 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\$_3_.exe"C:\Users\Admin\AppData\Local\Temp\$_3_.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\14224.bat" "C:\Users\Admin\AppData\Local\Temp\8F37020CC44744779E61D76D937E3C13\""2⤵
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\PING.EXEping 1.1.1.1 -n 1 -w 10003⤵
- Runs ping.exe
PID:3340
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98B
MD56b2742a906385fba09ea9f7dd2188cc0
SHA139297518c0167a0d7fb77fedf7a0ce1e59666ab2
SHA25655b32fced47b9b475818166131c462a5665717e9cebeedeebe389d09afbe3c69
SHA51289a261b8e74d7a4c7b0de0174e1b911be7ce1f57c578c6334b40cf4bc81d1b1e6dd342a0739eca40a688441569ce56b9d598757f6606a33e62037a2ae8a1c32b
-
Filesize
98B
MD5b671e9402fc4d2cd66a77a36b38c82f2
SHA192a2d19fef9c312e7088843aef5d12d619e5e789
SHA256d2f08d330d922ae2149dfe7bdb6527d55489200ac7fc8c3b4544afa54d932269
SHA512fe8dec324c09af5298a5c90cec2e20f240d49d6ad5d3f1ece00dcbaee406836e1761aaac4b0e688cf20d99099142b0bb81917c81aa8357f5a96ded2cc6dea646
-
Filesize
212B
MD5668767f1e0c7ff2b3960447e259e9f00
SHA132d8abf834cce72f5e845175a0af2513b00504d8
SHA256cdb93994093a24991c246d8b6f7003920a510a45bfc8441521314ce22a79191d
SHA512c07f26c8601cf91d9805004668463721ab91e14f3cc59e77e20f43d98e070ea8e742c38fe8021c4ffb1ebc02e3743ab732b66ff84bb24b59a5fdcc8634c77680
-
C:\Users\Admin\AppData\Local\Temp\8F37020CC44744779E61D76D937E3C13\8F37020CC44744779E61D76D937E3C13_LogFile.txt
Filesize3KB
MD52f5f1804aa0b09057fc8f4e42491e53a
SHA1aa646079111f790b4febe7b33f12b11b672242ac
SHA256a93806ffea53898426b78c436285dc3ee7fad645065aeb0d31e85564e44936b2
SHA512ef286354d0333207e11c8dd2a7c9df39bc4d8455f897a8778a97330950cf4eacbcd3ce63544a326eed06727be8cf5835c731477d16def4de46eda990f29d92e0
-
C:\Users\Admin\AppData\Local\Temp\8F37020CC44744779E61D76D937E3C13\8F37020CC44744779E61D76D937E3C13_LogFile.txt
Filesize3KB
MD5e3bd6cc2db1d3f5290c32000e87947c4
SHA15e913b20f3c7eb8e672f7f6e692f34d40dab0788
SHA256357c3b243a33e193775d5d7b4d1e192af155edf447099356489da752f508b692
SHA5129977fea478eb1e716fd3af53fadba0234afecd494aade863e4a4e0b8183b26988ef1985659e4bcc45a7d9e55e11f18083d039f5f21f4407272f412936ca07b7f
-
C:\Users\Admin\AppData\Local\Temp\8F37020CC44744779E61D76D937E3C13\8F37020CC44744779E61D76D937E3C13_LogFile.txt
Filesize2KB
MD57119c7d005288c8ded3bd989c04e4e72
SHA1c4031d1c23679299cae6b473df47af43c2ddfe15
SHA2562c47cdfa2c09967d8d23313cdca836de763a58a7aa223797acb11114793feefb
SHA512d991c6b0280e219a1bff6281b65336a114cdc6f65a3be6b000fa09dbaa9c6cc33861aabbaeb792a2141bf333d5f29e4be5b3c2e2d0ed84e36c926ab4fc580227
-
C:\Users\Admin\AppData\Local\Temp\8F37020CC44744779E61D76D937E3C13\8F37020CC44744779E61D76D937E3C13_LogFile.txt
Filesize5KB
MD57b6adb3c1f90736e75628499de0cff10
SHA16451ebac50df54945680d7ee12e788753a4e3208
SHA256ca24951b824eac15ff274cced878227ba5ae7cb404a27f3663383e8534b55f6d
SHA512e627e13737d1c6fea7815e0ca22eec22ca6160a162cfbcf4eeb8c1fff804e21b4ea4a765afbfc8e80908365624d644bf090290abb760cac53a9bd86337467ffe
-
Filesize
26KB
MD525f134ed7eb33a3c7ef42d0a7a193380
SHA18f15d8707144e783d3b30af5f99d0c0bf99a7f0a
SHA256d856ecae487faa1969b247a43ae5b211e797dfc3ace02f58009ce3dbb075e802
SHA5123d63093579f551b4fc1b1d2557d5adb4607929d66e2af3df7d12ad74f666952ae3a4803133e8057251bce1491e2a73080f149b7eebc804d41194d68c80669bfc