Analysis
-
max time kernel
131s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 07:12
Behavioral task
behavioral1
Sample
9693fd176c8734b1928a56cb9771a0c8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9693fd176c8734b1928a56cb9771a0c8.exe
Resource
win10v2004-20231215-en
General
-
Target
9693fd176c8734b1928a56cb9771a0c8.exe
-
Size
376KB
-
MD5
9693fd176c8734b1928a56cb9771a0c8
-
SHA1
35d2579e6a03c2e769b17f1aa8ce934f91fd5e13
-
SHA256
381ec80e02dba4fe1877e427522ea92a94b29b7f45bddd11c1f2ef9724dd6d2e
-
SHA512
cb68ab4fb44c52763294fbe010ae6383d1feafa0ea67c663c333f36b5ddac7374b2a787fe7f6b331893c40e94c060782a6d2a65acadb5771c05defe103a6a847
-
SSDEEP
6144:7IaXScY1S4GlA9jmHv/VCSY3hw9lMbk6u1QMS0y+lqiHTonWryFDYRF:H46A9jmP/uhu/yMS08CkntxYRF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation cmd.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\Debug\WIA\wiatrace.log mspaint.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000_Classes\Local Settings cmd.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2836 mspaint.exe 2836 mspaint.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 4820 9693fd176c8734b1928a56cb9771a0c8.exe 4820 9693fd176c8734b1928a56cb9771a0c8.exe 4820 9693fd176c8734b1928a56cb9771a0c8.exe 2836 mspaint.exe 2836 mspaint.exe 2836 mspaint.exe 2836 mspaint.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4820 wrote to memory of 3688 4820 9693fd176c8734b1928a56cb9771a0c8.exe 85 PID 4820 wrote to memory of 3688 4820 9693fd176c8734b1928a56cb9771a0c8.exe 85 PID 4820 wrote to memory of 3688 4820 9693fd176c8734b1928a56cb9771a0c8.exe 85 PID 3688 wrote to memory of 2836 3688 cmd.exe 87 PID 3688 wrote to memory of 2836 3688 cmd.exe 87 PID 3688 wrote to memory of 2836 3688 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\9693fd176c8734b1928a56cb9771a0c8.exe"C:\Users\Admin\AppData\Local\Temp\9693fd176c8734b1928a56cb9771a0c8.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp2⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\mspaint.exe"C:\Windows\system32\mspaint.exe" "C:\Users\Admin\AppData\Local\Temp\NewBitmapImage.bmp"3⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -p -s DeviceAssociationService1⤵PID:4460