Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/02/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
99a31aace0027a649baf6c52816b3d50.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
99a31aace0027a649baf6c52816b3d50.exe
Resource
win10v2004-20231215-en
General
-
Target
99a31aace0027a649baf6c52816b3d50.exe
-
Size
8KB
-
MD5
99a31aace0027a649baf6c52816b3d50
-
SHA1
b7a7493eead690d0055cc5307e0d35b412503be3
-
SHA256
781019a5dfd8c9476b08d2aaf31c17d85bffabd0a5c7dd6f3e4c4a648781cd21
-
SHA512
2317231e3d67af71a2ccf1c7fb811879c37bc7522f981060dab30ed7b3bec2cc966497d61908c53e881b5b9983a9a04a5b097b739cefa38c0be5df3ae23c1e01
-
SSDEEP
96:MprSKzrjGjqljAhDjN7D5FCJ0krsLjOKWLUU2BwozpHtFAbiLwgkxFftXjrKfDxH:INDQXDQki+zRnIbXKfDxQCzbvB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 99a31aace0027a649baf6c52816b3d50.exe -
Executes dropped EXE 1 IoCs
pid Process 2296 winudll.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winudll.exe = "C:\\Windows\\system32\\winudll.exe" winudll.exe Set value (str) \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winudll.exe = "C:\\Windows\\system32\\winudll.exe" 99a31aace0027a649baf6c52816b3d50.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winudll.exe 99a31aace0027a649baf6c52816b3d50.exe File created C:\Windows\SysWOW64\winudll.exe 99a31aace0027a649baf6c52816b3d50.exe File opened for modification C:\Windows\SysWOW64\winudll.exe winudll.exe File created C:\Windows\SysWOW64\winudll.exe winudll.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4700 99a31aace0027a649baf6c52816b3d50.exe Token: SeDebugPrivilege 2296 winudll.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4700 wrote to memory of 2296 4700 99a31aace0027a649baf6c52816b3d50.exe 86 PID 4700 wrote to memory of 2296 4700 99a31aace0027a649baf6c52816b3d50.exe 86 PID 4700 wrote to memory of 2296 4700 99a31aace0027a649baf6c52816b3d50.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\99a31aace0027a649baf6c52816b3d50.exe"C:\Users\Admin\AppData\Local\Temp\99a31aace0027a649baf6c52816b3d50.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\winudll.exe"C:\Windows\system32\winudll.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD599a31aace0027a649baf6c52816b3d50
SHA1b7a7493eead690d0055cc5307e0d35b412503be3
SHA256781019a5dfd8c9476b08d2aaf31c17d85bffabd0a5c7dd6f3e4c4a648781cd21
SHA5122317231e3d67af71a2ccf1c7fb811879c37bc7522f981060dab30ed7b3bec2cc966497d61908c53e881b5b9983a9a04a5b097b739cefa38c0be5df3ae23c1e01