Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
14-02-2024 18:18
Static task
static1
Behavioral task
behavioral1
Sample
9c53deb354cc19cc23f729bac105d314.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9c53deb354cc19cc23f729bac105d314.exe
Resource
win10v2004-20231215-en
General
-
Target
9c53deb354cc19cc23f729bac105d314.exe
-
Size
958KB
-
MD5
9c53deb354cc19cc23f729bac105d314
-
SHA1
63d562f5cc7ae3cd9c2c6be9d424bea20c95c84a
-
SHA256
1856771f4596b33be3108820d058370720e2a4042ccdef73a5fb8d399744839d
-
SHA512
efd58a07942d380d18b7a642c89329502a4f376030a38161d6be22dcb327ec753c6145ddd3249ae71c2a84f41e2a492e9b2bc78d5b1a2c1f028f5b52488ce2c7
-
SSDEEP
24576:BCuFhCwUuqDluBMfEhJX3z5mKhwbLeoUC:dhxqDosEL3F/w+U
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation 9c53deb354cc19cc23f729bac105d314.exe -
Loads dropped DLL 2 IoCs
pid Process 1300 9c53deb354cc19cc23f729bac105d314.exe 1300 9c53deb354cc19cc23f729bac105d314.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1300 9c53deb354cc19cc23f729bac105d314.exe 1300 9c53deb354cc19cc23f729bac105d314.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1300 wrote to memory of 4632 1300 9c53deb354cc19cc23f729bac105d314.exe 87 PID 1300 wrote to memory of 4632 1300 9c53deb354cc19cc23f729bac105d314.exe 87 PID 1300 wrote to memory of 4632 1300 9c53deb354cc19cc23f729bac105d314.exe 87 PID 1300 wrote to memory of 4284 1300 9c53deb354cc19cc23f729bac105d314.exe 89 PID 1300 wrote to memory of 4284 1300 9c53deb354cc19cc23f729bac105d314.exe 89 PID 1300 wrote to memory of 4284 1300 9c53deb354cc19cc23f729bac105d314.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c53deb354cc19cc23f729bac105d314.exe"C:\Users\Admin\AppData\Local\Temp\9c53deb354cc19cc23f729bac105d314.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\ProgramData\smes\u.bat"2⤵PID:4632
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\temg_tmp.bat"2⤵PID:4284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44B
MD5704efba1aee1454561da552dda430498
SHA1d20fb96683f769eb9cef1b0a068bcba70aeab9c2
SHA25680b08d35bd27636e0774ce35ab57306f76edc6a0f7058cb1f93733cdf88bf94c
SHA5127e0c9ede686238703af4893af8842c05c48ab1681ae273b32d8085cf1a17aae946c0c823a0a418787522a551d684367259ff8203ebca6e4ec69b6ded95231bd0
-
Filesize
10KB
MD5055f4f9260e07fc83f71877cbb7f4fad
SHA1a245131af1a182de99bd74af9ff1fab17977a72f
SHA2564209588362785b690d08d15cd982b8d1c62c348767ca19114234b21d5df74ddc
SHA512a8e82dc4435ed938f090f43df953ddad9b0075f16218c09890c996299420162d64b1dbfbf613af37769ae796717eec78204dc786b757e8b1d13d423d4ee82e26
-
Filesize
3KB
MD58614c450637267afacad1645e23ba24a
SHA1e7b7b09b5bbc13e910aa36316d9cc5fc5d4dcdc2
SHA2560fa04f06a6de18d316832086891e9c23ae606d7784d5d5676385839b21ca2758
SHA512af46cd679097584ff9a1d894a729b6397f4b3af17dff3e6f07bef257bc7e48ffa341d82daf298616cd5df1450fc5ab7435cacb70f27302b6db193f01a9f8391b
-
Filesize
121B
MD545b0133696b09e601af4757ba5abc995
SHA1ca542e5309efa1fddb190df26e19c93e2f66c604
SHA256518808122566cd676651f5d40fdceecf02c4a85149f3e784cbdc1e67bcecad27
SHA5123ca3d3f82b144bf180ff4076cedba29744ce0b5ba4181123315d42b35214d16c6d92942464a7af5bf71bdff290f8963f2cb563215720445eacfb10b842521b63