Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 05:32
Static task
static1
Behavioral task
behavioral1
Sample
d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b.exe
Resource
win10v2004-20231215-en
General
-
Target
d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b.exe
-
Size
883KB
-
MD5
e971fbdaaa67de4306e72738e3a10392
-
SHA1
bac689957e126c88435f22ef0b0df10c3b52e1fc
-
SHA256
d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b
-
SHA512
bee73df1600df0184876d86f16193bd8c86353ff2608524debf84fad1a52730dfab91186bea5e89d60338f6ee0f007f2ffe2cd11ec9598d4245a3043a023ca34
-
SSDEEP
12288:Wj6mRlmDKClMfkrPEBuGKw3f+s2geR3VJgx3ZGBnxxSmOMrXJK45d1b:W2a4KCycrPQIo+aePmx6nxxSm1J11
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b.exe -
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe cmd.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe cmd.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype.lnk d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b.exe -
Executes dropped EXE 1 IoCs
pid Process 3884 skype.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3884 set thread context of 4012 3884 skype.exe 98 PID 4012 set thread context of 3444 4012 AddInProcess32.exe 40 PID 4012 set thread context of 368 4012 AddInProcess32.exe 99 PID 368 set thread context of 3444 368 rundll32.exe 40 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1300 PING.EXE 4856 PING.EXE -
Suspicious behavior: EnumeratesProcesses 56 IoCs
pid Process 3260 d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3248 skype.exe 3884 skype.exe 3884 skype.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 4012 AddInProcess32.exe 368 rundll32.exe 368 rundll32.exe 368 rundll32.exe 368 rundll32.exe 368 rundll32.exe 368 rundll32.exe 368 rundll32.exe 368 rundll32.exe 368 rundll32.exe 368 rundll32.exe 368 rundll32.exe 368 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4012 AddInProcess32.exe 3444 Explorer.EXE 3444 Explorer.EXE 368 rundll32.exe 368 rundll32.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3260 d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3260 d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b.exe Token: SeDebugPrivilege 3248 skype.exe Token: SeDebugPrivilege 3884 skype.exe Token: SeDebugPrivilege 4012 AddInProcess32.exe Token: SeDebugPrivilege 368 rundll32.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 3260 wrote to memory of 3248 3260 d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b.exe 88 PID 3260 wrote to memory of 3248 3260 d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b.exe 88 PID 3260 wrote to memory of 3248 3260 d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b.exe 88 PID 3248 wrote to memory of 4472 3248 skype.exe 92 PID 3248 wrote to memory of 4472 3248 skype.exe 92 PID 3248 wrote to memory of 4472 3248 skype.exe 92 PID 4472 wrote to memory of 1300 4472 cmd.exe 94 PID 4472 wrote to memory of 1300 4472 cmd.exe 94 PID 4472 wrote to memory of 1300 4472 cmd.exe 94 PID 4472 wrote to memory of 4856 4472 cmd.exe 96 PID 4472 wrote to memory of 4856 4472 cmd.exe 96 PID 4472 wrote to memory of 4856 4472 cmd.exe 96 PID 4472 wrote to memory of 3884 4472 cmd.exe 97 PID 4472 wrote to memory of 3884 4472 cmd.exe 97 PID 4472 wrote to memory of 3884 4472 cmd.exe 97 PID 3884 wrote to memory of 4012 3884 skype.exe 98 PID 3884 wrote to memory of 4012 3884 skype.exe 98 PID 3884 wrote to memory of 4012 3884 skype.exe 98 PID 3884 wrote to memory of 4012 3884 skype.exe 98 PID 3884 wrote to memory of 4012 3884 skype.exe 98 PID 3884 wrote to memory of 4012 3884 skype.exe 98 PID 3444 wrote to memory of 368 3444 Explorer.EXE 99 PID 3444 wrote to memory of 368 3444 Explorer.EXE 99 PID 3444 wrote to memory of 368 3444 Explorer.EXE 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b.exe"C:\Users\Admin\AppData\Local\Temp\d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\skype.exe"C:\Users\Admin\AppData\Local\Temp\skype.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 13 > nul && copy "C:\Users\Admin\AppData\Local\Temp\skype.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe" && ping 127.0.0.1 -n 13 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"3⤵
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 134⤵
- Runs ping.exe
PID:1300
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 134⤵
- Runs ping.exe
PID:4856
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\skype\skype.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3884 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"5⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4012
-
-
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:368
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b18bd43958115cd3b7b22e45103c10c5
SHA1ff9fd020e81b03fd84c878ea24f27e8b41389435
SHA25667cb85ee85191bd3203adf49b1d0199867ac66f0b114a09a8392d5d5b1dd36d4
SHA5125101dd146815472c878a05cd345eae6a7f730c2059a368c56673e9c3ec47696e788162f15390b54b4e1d066fd56cae56fc6e8bf7ea6e5af250aaf1e8c8e68c00
-
Filesize
883KB
MD5e971fbdaaa67de4306e72738e3a10392
SHA1bac689957e126c88435f22ef0b0df10c3b52e1fc
SHA256d174a885ddd228e34d9e7086b97062694c0f828edc0d4cc37150519407e09f5b
SHA512bee73df1600df0184876d86f16193bd8c86353ff2608524debf84fad1a52730dfab91186bea5e89d60338f6ee0f007f2ffe2cd11ec9598d4245a3043a023ca34