Analysis
-
max time kernel
145s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
14/02/2024, 01:42
Static task
static1
Behavioral task
behavioral1
Sample
9a723fb229e80471a2ecd08e554cb4ac.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9a723fb229e80471a2ecd08e554cb4ac.exe
Resource
win10v2004-20231222-en
General
-
Target
9a723fb229e80471a2ecd08e554cb4ac.exe
-
Size
3.2MB
-
MD5
9a723fb229e80471a2ecd08e554cb4ac
-
SHA1
b948622c9f0769b4cb0994bb638690b6bbf73d57
-
SHA256
8e0c8a64a47dec2fadfd2088ec4a75926faf5b84fd3a0b724f97e8acffe15d24
-
SHA512
f7839bfc1a456e663539d70ed100bf4ab6cac8aa6bd3809a8a2e7a4a80cae47ad348bf806e351e7ea60ec29d941a2654b7c7a56b4028c77545c9dd5202d0d9b1
-
SSDEEP
98304:ulSdO/Q+jrAHkP3AUm1pkv944Q+2FP0g+:eSw4+wk3rm111BR+
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 9a723fb229e80471a2ecd08e554cb4ac.tmp -
Executes dropped EXE 2 IoCs
pid Process 5016 9a723fb229e80471a2ecd08e554cb4ac.tmp 5636 rkverify.exe -
Loads dropped DLL 2 IoCs
pid Process 5636 rkverify.exe 5016 9a723fb229e80471a2ecd08e554cb4ac.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 5636 rkverify.exe 5636 rkverify.exe 5636 rkverify.exe 5636 rkverify.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5636 rkverify.exe 5636 rkverify.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5380 wrote to memory of 5016 5380 9a723fb229e80471a2ecd08e554cb4ac.exe 84 PID 5380 wrote to memory of 5016 5380 9a723fb229e80471a2ecd08e554cb4ac.exe 84 PID 5380 wrote to memory of 5016 5380 9a723fb229e80471a2ecd08e554cb4ac.exe 84 PID 5016 wrote to memory of 5636 5016 9a723fb229e80471a2ecd08e554cb4ac.tmp 85 PID 5016 wrote to memory of 5636 5016 9a723fb229e80471a2ecd08e554cb4ac.tmp 85 PID 5016 wrote to memory of 5636 5016 9a723fb229e80471a2ecd08e554cb4ac.tmp 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a723fb229e80471a2ecd08e554cb4ac.exe"C:\Users\Admin\AppData\Local\Temp\9a723fb229e80471a2ecd08e554cb4ac.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5380 -
C:\Users\Admin\AppData\Local\Temp\is-SUJ7K.tmp\9a723fb229e80471a2ecd08e554cb4ac.tmp"C:\Users\Admin\AppData\Local\Temp\is-SUJ7K.tmp\9a723fb229e80471a2ecd08e554cb4ac.tmp" /SL5="$70064,2994332,53248,C:\Users\Admin\AppData\Local\Temp\9a723fb229e80471a2ecd08e554cb4ac.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\is-ORNMK.tmp\rkverify.exe"C:\Users\Admin\AppData\Local\Temp\is-ORNMK.tmp\rkverify.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD5580d9673e5ec5d90de1f83e2fd1742c2
SHA10dd94bcc3dc39097bf4bea145356e398665dda4f
SHA256868b1aee31c6335a5fc4257f20346e2d99fbd86bc7554b415da41fc19b13b3b1
SHA512f31f651034ccdaa7ed0bc134186ec56a687495ebf4888fc0d538457684b9f4dbb1b63f38f5881af929ef41e7a4f5d2820e0301118d79e32c4b3c1f1fdef9696b
-
Filesize
236KB
MD513a90680100cd1dd6e49bb3c8982b671
SHA111cd205b2d87a595bbd762ba34e6f85cc7dbced5
SHA256cc93832d7ebdbe3179c883ec56c7f04122512143910b5b091e01cd63c9a4438e
SHA5120283436e103c02f6ffac99fa4ec4824373c7e77f8627cc4812354ee51029187d446ed98fb1f1f0f204d1d63eaa377e0f7c9511360c213c76662b8a9e25939c51
-
Filesize
669KB
MD552950ac9e2b481453082f096120e355a
SHA1159c09db1abcee9114b4f792ffba255c78a6e6c3
SHA25625fbc88c7c967266f041ae4d47c2eae0b96086f9e440cca10729103aee7ef6cd
SHA5125b61c28bbcaedadb3b6cd3bb8a392d18016c354c4c16e01395930666addc95994333dfc45bea1a1844f6f1585e79c729136d3714ac118b5848becde0bdb182ba