Analysis
-
max time kernel
143s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08-02-2024 02:16
Static task
static1
Behavioral task
behavioral1
Sample
9586779b197073c3004fba0593e40d76.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9586779b197073c3004fba0593e40d76.exe
Resource
win10v2004-20231215-en
General
-
Target
9586779b197073c3004fba0593e40d76.exe
-
Size
5.0MB
-
MD5
9586779b197073c3004fba0593e40d76
-
SHA1
9bcdf21ef19b847a2e68d6dd53b6461abb931162
-
SHA256
c0ad14caca8b8b0972e40ddb9a95a036480055bab963ac39dfa1d5fa952fbf60
-
SHA512
302d531377b37205d105693223fb85a7fd0281516331bb3225794afcc6ef357aafc4a1d7b83b0dff0b983c3088a88077542137f2bed04f794a648eed9c68bae8
-
SSDEEP
98304:1eM85gLFg3vqpaF4tbigrdNet7NDx+9am+rDy1yz+Ve5dQn1Zx7veL5LRX47zvLM:r85IFg3vqpaUiee3Y9cDefVe5dQ17De9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
WScript.exe9586779b197073c3004fba0593e40d76.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 9586779b197073c3004fba0593e40d76.exe -
Executes dropped EXE 2 IoCs
Processes:
7za.exeSetup.exepid process 2792 7za.exe 5600 Setup.exe -
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\Setup.exe upx behavioral2/memory/5600-522-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/5600-524-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
Processes:
resource yara_rule behavioral2/memory/5600-524-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
9586779b197073c3004fba0593e40d76.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000_Classes\Local Settings 9586779b197073c3004fba0593e40d76.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Setup.exepid process 5600 Setup.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
9586779b197073c3004fba0593e40d76.exeWScript.execmd.exedescription pid process target process PID 3772 wrote to memory of 4712 3772 9586779b197073c3004fba0593e40d76.exe WScript.exe PID 3772 wrote to memory of 4712 3772 9586779b197073c3004fba0593e40d76.exe WScript.exe PID 3772 wrote to memory of 4712 3772 9586779b197073c3004fba0593e40d76.exe WScript.exe PID 4712 wrote to memory of 1060 4712 WScript.exe cmd.exe PID 4712 wrote to memory of 1060 4712 WScript.exe cmd.exe PID 4712 wrote to memory of 1060 4712 WScript.exe cmd.exe PID 1060 wrote to memory of 2792 1060 cmd.exe 7za.exe PID 1060 wrote to memory of 2792 1060 cmd.exe 7za.exe PID 1060 wrote to memory of 2792 1060 cmd.exe 7za.exe PID 1060 wrote to memory of 5600 1060 cmd.exe Setup.exe PID 1060 wrote to memory of 5600 1060 cmd.exe Setup.exe PID 1060 wrote to memory of 5600 1060 cmd.exe Setup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9586779b197073c3004fba0593e40d76.exe"C:\Users\Admin\AppData\Local\Temp\9586779b197073c3004fba0593e40d76.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Lanceur.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Extract.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\7za.exe.\7za.exe e .\WebPlayerTV.7z -pjesuisadmin -y4⤵
- Executes dropped EXE
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe.\Setup.exe4⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:5600
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
574KB
MD542badc1d2f03a8b1e4875740d3d49336
SHA1cee178da1fb05f99af7a3547093122893bd1eb46
SHA256c136b1467d669a725478a6110ebaaab3cb88a3d389dfa688e06173c066b76fcf
SHA5126bc519a7368ee6bd8c8f69f2d634dd18799b4ca31fbc284d2580ba625f3a88b6a52d2bc17bea0e75e63ca11c10356c47ee00c2c500294abcb5141424fc5dc71c
-
Filesize
87B
MD59495ff73014b8a17bd4798911ad097fa
SHA171b6db4d7e576cf8b1cbf93079397bc0c1ce46b2
SHA2560a59275adf474e7164e14a7e622ecb93f3a1477958e6e1e0de6d7ae2c6913a33
SHA51255062bb9381ac302367aeb43492613762434da730663891f577e050fcbc0993eaf19e96154adf4d669cb9587d8eef2a7ec96cb02b366db5d5c58b1eefe64ecd3
-
Filesize
115B
MD567eb1322395d41dddc9045b4eef2309d
SHA1b85b2332b9fd4ac03aec49a9291e90e8b96547a5
SHA25656ddc657309aeab74ca42cf466deac992da8a0054830340ba839ffdf1d242be4
SHA512de37b1358f639f6647e6ae99b6719a0ddf5e9b8f9e8ea33b6284ecac3d33650e9257a63697dcd5d79ee5ed2790ece0b3aca3332719f678ca89f3d4562b00603d
-
Filesize
412KB
MD584a495da12130393c9c05d9bf15e36be
SHA158b3746de71279fd0905526a7f07c26a0cb52893
SHA25699bbe3ddad3c227fda24a2a227b1e664aef3538877b31281eda32333a2bfaf60
SHA512dc8a85c085e6811560956b4ed106abd7180c5c0ae95a95a7f61ee6633f22f5541d68ad197c9863bffd40e4153ae4f372e0f5fc613031db7bcb45749a3f352edb
-
Filesize
4.6MB
MD5d146c84ee942954eb4c1a792d1de60b6
SHA1c73f141bfd36b7fc5bbe1373da4124769ac84405
SHA2568c0771717c96bb79f59a0a72a428115e848ba40ef3a2b9113758f5fcf7b5aeab
SHA512701d61395854ff468505787214826b4d1a26922cec1ed9ca5a87c8d3f6efb651fbe2a33ac27df3a7d95fe4b45ab83ae8d2ba240ac7f9a080b5f520a9db1463cd
-
Filesize
383B
MD5e48e0650aee7207a0b908d9830b0b487
SHA156d23ed45ebf1ec42914da69bdd5b890733744b2
SHA256652034b9a3d29611ec91971a3f3d7e9438c0ed748f050df4329371ccf91da0ee
SHA512c0ca42779a040e3aeaaf8d4f53d4ce17639dc82068d90d78830ba927f652c8127fca19321bddeaba321d9470d78892fa48d1d83dc9cebae1bdf88704fa0ae1cb