Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
12-02-2024 09:07
Static task
static1
Behavioral task
behavioral1
Sample
96ca1cd7e5ab84dfc0f92908120fc104.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
96ca1cd7e5ab84dfc0f92908120fc104.exe
Resource
win10v2004-20231222-en
General
-
Target
96ca1cd7e5ab84dfc0f92908120fc104.exe
-
Size
43KB
-
MD5
96ca1cd7e5ab84dfc0f92908120fc104
-
SHA1
a740d3bd3435a14dd2873c7b665e5be0cc08f08b
-
SHA256
942110272510a43eed52302413287bd08b446fa7da50cc76b7414ce3bafe26a2
-
SHA512
09a7c7f65e644f65fa2d8beadc8db87f3c110d77a299574236cfaa0f396b0a3f7b0e5e3db466432ffaba7540c97cce2f5a66787e1380b31d780fc8ff5a74f15c
-
SSDEEP
768:bCKqDQStlBJ1p+j5ZXFKS34WVuyuMJreKYwjJMQ26AzuN8q8:eKqDQi7c5ZXFKCKjKYQsuI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation LL.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 96ca1cd7e5ab84dfc0f92908120fc104.exe -
Executes dropped EXE 1 IoCs
pid Process 4664 LL.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\LL.exe 96ca1cd7e5ab84dfc0f92908120fc104.exe File created C:\Windows\SysWOW64\LL.exe 96ca1cd7e5ab84dfc0f92908120fc104.exe File opened for modification C:\Windows\SysWOW64\LL.exe LL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1228 4664 WerFault.exe 85 3620 524 WerFault.exe 51 -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 524 wrote to memory of 1216 524 96ca1cd7e5ab84dfc0f92908120fc104.exe 83 PID 524 wrote to memory of 1216 524 96ca1cd7e5ab84dfc0f92908120fc104.exe 83 PID 524 wrote to memory of 1216 524 96ca1cd7e5ab84dfc0f92908120fc104.exe 83 PID 524 wrote to memory of 4664 524 96ca1cd7e5ab84dfc0f92908120fc104.exe 85 PID 524 wrote to memory of 4664 524 96ca1cd7e5ab84dfc0f92908120fc104.exe 85 PID 524 wrote to memory of 4664 524 96ca1cd7e5ab84dfc0f92908120fc104.exe 85 PID 4664 wrote to memory of 2104 4664 LL.exe 88 PID 4664 wrote to memory of 2104 4664 LL.exe 88 PID 4664 wrote to memory of 2104 4664 LL.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\96ca1cd7e5ab84dfc0f92908120fc104.exe"C:\Users\Admin\AppData\Local\Temp\96ca1cd7e5ab84dfc0f92908120fc104.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c date 2005-10-312⤵PID:1216
-
-
C:\Windows\SysWOW64\LL.exeC:\Windows\system32\LL.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c date 2005-10-313⤵PID:2104
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4664 -s 6603⤵
- Program crash
PID:1228
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 5602⤵
- Program crash
PID:3620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 524 -ip 5241⤵PID:1408
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4664 -ip 46641⤵PID:4264
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
43KB
MD596ca1cd7e5ab84dfc0f92908120fc104
SHA1a740d3bd3435a14dd2873c7b665e5be0cc08f08b
SHA256942110272510a43eed52302413287bd08b446fa7da50cc76b7414ce3bafe26a2
SHA51209a7c7f65e644f65fa2d8beadc8db87f3c110d77a299574236cfaa0f396b0a3f7b0e5e3db466432ffaba7540c97cce2f5a66787e1380b31d780fc8ff5a74f15c