Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 11:19
Static task
static1
Behavioral task
behavioral1
Sample
994a36321a63f1e49b3a79afa332fa07.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
994a36321a63f1e49b3a79afa332fa07.exe
Resource
win10v2004-20231215-en
General
-
Target
994a36321a63f1e49b3a79afa332fa07.exe
-
Size
10KB
-
MD5
994a36321a63f1e49b3a79afa332fa07
-
SHA1
c45250cb0fef51942c981950928d518f88b09421
-
SHA256
d133dc4fce7e41aadcb99764b6a212aff2d50d1b8c447289582232885a13b97d
-
SHA512
86a256ea0d9efd9e9acfa6e37f680eb477e2622c2e7e0a7ea4646b4b9b4fe40cb09f731fba5cbbeddd01a9dd838ed7aa119ecf895e4ef94585b7e4c80d8d3c43
-
SSDEEP
192:Nekfn2UklmxRdn/YL6dqkYTLZk/JDHWYOG372+NGMXkpKQVc5ndzP8D6vmj5:Nrv2Hmx3yoq9mhf17h4MXkXc5ndzPut
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 994a36321a63f1e49b3a79afa332fa07.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation fxmngr.exe -
Executes dropped EXE 1 IoCs
pid Process 1308 fxmngr.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ts.ico 994a36321a63f1e49b3a79afa332fa07.exe File created C:\Windows\SysWOW64\ot.ico 994a36321a63f1e49b3a79afa332fa07.exe File created C:\Windows\SysWOW64\fxmngr.exe 994a36321a63f1e49b3a79afa332fa07.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1308 fxmngr.exe Token: SeIncBasePriorityPrivilege 808 994a36321a63f1e49b3a79afa332fa07.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 808 wrote to memory of 1308 808 994a36321a63f1e49b3a79afa332fa07.exe 84 PID 808 wrote to memory of 1308 808 994a36321a63f1e49b3a79afa332fa07.exe 84 PID 808 wrote to memory of 1308 808 994a36321a63f1e49b3a79afa332fa07.exe 84 PID 1308 wrote to memory of 4412 1308 fxmngr.exe 85 PID 1308 wrote to memory of 4412 1308 fxmngr.exe 85 PID 1308 wrote to memory of 4412 1308 fxmngr.exe 85 PID 808 wrote to memory of 3476 808 994a36321a63f1e49b3a79afa332fa07.exe 86 PID 808 wrote to memory of 3476 808 994a36321a63f1e49b3a79afa332fa07.exe 86 PID 808 wrote to memory of 3476 808 994a36321a63f1e49b3a79afa332fa07.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\994a36321a63f1e49b3a79afa332fa07.exe"C:\Users\Admin\AppData\Local\Temp\994a36321a63f1e49b3a79afa332fa07.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Windows\SysWOW64\fxmngr.exeC:\Windows\system32\fxmngr.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\fxmngr.exe > nul3⤵PID:4412
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\994A36~1.EXE > nul2⤵PID:3476
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
109B
MD582c6041e6f1e8edaef89150ce7c09e3d
SHA1b1914bb4491357de109f639d031d375f1c3ee3f1
SHA2560f26bd5671f3cbfd0056cc3e44dc3ede7c8d5b0700071f546faf7908a7f0ee64
SHA51267b69b25b6d0fd6c2002f183d0f2d24f8b56464a72356c37a1ce48653dc4d05893332b0054b6a21b2667ecf0d961be0b53bea587013a1e54a01b6799e5a36a76
-
Filesize
2KB
MD5af1444409e57da51b24ddcc141ba86d9
SHA1a43c07c82cc766e418cf8b3bfe1f3a158d3c4977
SHA256f7b7738a55c2c092dd6f6089f82bcb10adf9bfcb36169bad111580b8b48d6bee
SHA512c3ffd1a935ae99185a2929d4021e855094e300f7262ceac7d02dfd805545c4201b266847b9eba6ec519a9d62d66b213e4bec7a3f500b25662dcf092b25c00d58