Analysis
-
max time kernel
142s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/02/2024, 16:32
Static task
static1
Behavioral task
behavioral1
Sample
6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe
Resource
win10v2004-20231215-en
General
-
Target
6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe
-
Size
196KB
-
MD5
bf7bd7bfb88531b7e2ed9596c9a32365
-
SHA1
3bdf46175bd5ee1f13084d726254fd1ec0d6cef8
-
SHA256
6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0
-
SHA512
bf321c40d8034b4631b417f351334cac0be3b8700cbe5fd6f97eb68d60b6c8ab2b1197ffbdfa4f22db4573ee7d9ca312cb1e946e23624e1a0e0e261f0477b5db
-
SSDEEP
6144:rBs27MMLyX5HXXXDTXXXOGqIII+pXXX5AYjKXXXDoXXXG6XXXxXXXLIIIEAkOCOn:rK20HXXX/XXXFqIIIcXXX5j2XXXcXXXu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation 6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe -
Executes dropped EXE 1 IoCs
pid Process 4588 xsqhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\xsqhost.exe 6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe File opened for modification C:\Windows\Debug\xsqhost.exe 6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 xsqhost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz xsqhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3832 6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3832 wrote to memory of 2036 3832 6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe 84 PID 3832 wrote to memory of 2036 3832 6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe 84 PID 3832 wrote to memory of 2036 3832 6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe"C:\Users\Admin\AppData\Local\Temp\6b846155d0424d487eb4edf277d923619b8cc439563a2aef3873b50f2fb8fac0.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\6B8461~1.EXE > nul2⤵PID:2036
-
-
C:\Windows\Debug\xsqhost.exeC:\Windows\Debug\xsqhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:4588
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD5e21b2fa0480c9de49161b8ba076df6df
SHA148141c17a40ff103fe1b5533ee5a7a0919b48bff
SHA256350429ceb57048bacc434863242978344b34086ebdba4f471a14a45283469e48
SHA51221297faa7e8da520879c8c22328643df25ae58c1ed8c0758bc5726adb1ac31d7b57cb9f68e8f043870c71ca629566f29fc1efbcea795e20300f1cba3bbfb84db