Analysis
-
max time kernel
90s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
95d55f4db5d7e95416ebbd04e3a3121d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
95d55f4db5d7e95416ebbd04e3a3121d.exe
Resource
win10v2004-20231222-en
General
-
Target
95d55f4db5d7e95416ebbd04e3a3121d.exe
-
Size
6KB
-
MD5
95d55f4db5d7e95416ebbd04e3a3121d
-
SHA1
a49995cb82b0211db5284cd94deab5847ea50ea7
-
SHA256
cb3b013e32437626d6fbfc2ea4a2573f1943899e505c1137b8205fb1d0c6cc25
-
SHA512
f4dfe07e0f47b5ba0075467a8f7f1a8c120f313356b085e0b1e2809b7898e1e342a3c8d280a35477d0cf9493cf7b435d21f0a75fd936d4d9decaa3197179c6a7
-
SSDEEP
96:apmpv8aaJUTg71/GZWl0BxpxIuul43uqeDwnseOkfSWlC7tsgC0AGIQDS6T3KHmV:Cgr3DLul43xowns+k7tsgC0lOY3KpQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 95d55f4db5d7e95416ebbd04e3a3121d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3888 95d55f4db5d7e95416ebbd04e3a3121d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3888 wrote to memory of 2484 3888 95d55f4db5d7e95416ebbd04e3a3121d.exe 84 PID 3888 wrote to memory of 2484 3888 95d55f4db5d7e95416ebbd04e3a3121d.exe 84 PID 3888 wrote to memory of 2484 3888 95d55f4db5d7e95416ebbd04e3a3121d.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\95d55f4db5d7e95416ebbd04e3a3121d.exe"C:\Users\Admin\AppData\Local\Temp\95d55f4db5d7e95416ebbd04e3a3121d.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\95D55F~1.EXE > nul2⤵PID:2484
-