Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
9a33c23302e46a64349b447851a554b1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a33c23302e46a64349b447851a554b1.exe
Resource
win10v2004-20231215-en
General
-
Target
9a33c23302e46a64349b447851a554b1.exe
-
Size
121KB
-
MD5
9a33c23302e46a64349b447851a554b1
-
SHA1
2465640efa1bfc823ece142509d3dd2849be1cdf
-
SHA256
9af9210eef9fbc108e7a625ea4b6cfc57313d4a9fbe3c32b82712870d5218c01
-
SHA512
f54ba9a221e24b241f57facc609eb290e02f2e5d9ea67fdc9223611ed984e6981632535660a96f6f3badcd710eb2bb19cade4a85387f318e56093c39632af137
-
SSDEEP
3072:azNWMKKRZYchObK91C8sV6Xmoo4L2SSTJK5i3:aZuuObR8sVImc2SSTJp3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 9a33c23302e46a64349b447851a554b1.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000_Classes\Local Settings 9a33c23302e46a64349b447851a554b1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3624 wrote to memory of 576 3624 9a33c23302e46a64349b447851a554b1.exe 84 PID 3624 wrote to memory of 576 3624 9a33c23302e46a64349b447851a554b1.exe 84 PID 3624 wrote to memory of 576 3624 9a33c23302e46a64349b447851a554b1.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a33c23302e46a64349b447851a554b1.exe"C:\Users\Admin\AppData\Local\Temp\9a33c23302e46a64349b447851a554b1.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\jagi.jpg.vbs"2⤵PID:576
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD58285f979380bc9f61f9613d9b04fb938
SHA1f3ac8de375dfb2403b64bd161c6485365ff31b69
SHA256daba03a6b029e8482d3dc4d9bbe7f65b920c89449625080694e6965ad34ff4a5
SHA51242455307ce282a1323c7c7eb2454acf1b8b176a8d6ab63905431b6315f80b7209570896b488d57a46f4a8854270faafb2c1c7ced2d35e9de0e90d423726b165a