Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 16:01
Static task
static1
Behavioral task
behavioral1
Sample
a239be57fd3ea173cb942f0fc6962901.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a239be57fd3ea173cb942f0fc6962901.exe
Resource
win10v2004-20240221-en
General
-
Target
a239be57fd3ea173cb942f0fc6962901.exe
-
Size
355KB
-
MD5
a239be57fd3ea173cb942f0fc6962901
-
SHA1
8b66da72a6bee38b0270e09011418d96128a305c
-
SHA256
637a7a01786bfa5a6297fd00d7bccf64a6fc6a12e99b5fcbcc34f3cf69b66f8d
-
SHA512
6c0cd928c3bc5f43e57842e91f5b133420e2ac05e8c51a7c2026c67d836721d82191ceb286015586202b2e1df7d5f1cb507ee3ce772d064cdd76f9049b4139d0
-
SSDEEP
6144:+Y400b2DUdwIsa7eIt/wf1cNwPLvoqg0R2VhPefm0To63vUmyGj0gWtxdV7HMyLE:e00XsGNw1c2obY7QTGjFWtxTzMyLvjI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-910440534-423636034-2318342392-1000\Control Panel\International\Geo\Nation server.exe -
Executes dropped EXE 1 IoCs
pid Process 4776 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a239be57fd3ea173cb942f0fc6962901.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D544C22D-1F70-4B1E-873D-D8DABEB26695}\ server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D544C22D-1F70-4B1E-873D-D8DABEB26695}\InProcServer32 server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D544C22D-1F70-4B1E-873D-D8DABEB26695}\InProcServer32\ = "C:\\Program Files\\Common Files\\Microsoft Shared\\MSINFO\\atmQQ2.dll" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D544C22D-1F70-4B1E-873D-D8DABEB26695}\InProcServer32\ThreadingModel = "Apartment" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D544C22D-1F70-4B1E-873D-D8DABEB26695} server.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4776 server.exe 4776 server.exe 4776 server.exe 4776 server.exe 4776 server.exe 4776 server.exe 4776 server.exe 4776 server.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3076 wrote to memory of 4776 3076 a239be57fd3ea173cb942f0fc6962901.exe 84 PID 3076 wrote to memory of 4776 3076 a239be57fd3ea173cb942f0fc6962901.exe 84 PID 3076 wrote to memory of 4776 3076 a239be57fd3ea173cb942f0fc6962901.exe 84 PID 4776 wrote to memory of 3972 4776 server.exe 87 PID 4776 wrote to memory of 3972 4776 server.exe 87 PID 4776 wrote to memory of 3972 4776 server.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a239be57fd3ea173cb942f0fc6962901.exe"C:\Users\Admin\AppData\Local\Temp\a239be57fd3ea173cb942f0fc6962901.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\BT.BAT" "3⤵PID:3972
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD5e74319a75d8701ef34e7a2d8d5df838c
SHA1b1f7b0c8379986ae34a5dc87c2f1dcc714df97f8
SHA256221f70980dc3a29ebf3b121af458d34e1b8031556831cd7ed329f1017ea2cb84
SHA512985d6464780119c9fdb8e2d148e34ad9dd58158b76668722d78cac4ed74e61487f88a30c4f04361d4aec8eeee0530b1e256adbec65d17c0528b4525d9619260b
-
Filesize
50KB
MD5cb2967dbe1e6d0e843b329e487a30d2d
SHA1ba8667c537ffee001f9fb672f64e472bcd9e2fa6
SHA256bbbc9455e63cfcf7b6c4e6ad0ccbb61bfa3192a94e9b96105b6ee59f16380184
SHA512422b6ddc71ffc258f752c3e345b17c776b89734e446a023f86026991b0c10e25203ae2d61e60f0d41f4155930dc16e21753a90ca2c551cc50c65899031ae9703