Analysis
-
max time kernel
143s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 19:02
Static task
static1
Behavioral task
behavioral1
Sample
a2844dfc7055b74393597e4a2e56ff44.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
a2844dfc7055b74393597e4a2e56ff44.exe
Resource
win10v2004-20240221-en
General
-
Target
a2844dfc7055b74393597e4a2e56ff44.exe
-
Size
891KB
-
MD5
a2844dfc7055b74393597e4a2e56ff44
-
SHA1
e86282aedf6f731035ddcdd6b60a481fa8b014ee
-
SHA256
a0928f976cf5649ffee2a07ebaa379f7fd74547806bcce91255179459c2a7f8d
-
SHA512
5db7e895beb74f02c57e4f2e4706f320e0df9712461f7d0eb659b609627fed6ee49a41c64ec292622c5f5ffa5768b5148d189d1c23d91debee4e52462a9df4c0
-
SSDEEP
24576:IAgCYQ1LGum4sx8Kofd/uV+w+p+mzeUhYfq4G:7gCh1LGumhuW+Jp+QeUhYfo
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2200714112-3788720386-2559682836-1000\Control Panel\International\Geo\Nation a2844dfc7055b74393597e4a2e56ff44.exe -
Executes dropped EXE 1 IoCs
pid Process 3172 irsetup.exe -
resource yara_rule behavioral2/files/0x0006000000023217-4.dat upx behavioral2/memory/3172-11-0x0000000000400000-0x0000000000581000-memory.dmp upx behavioral2/memory/3172-21-0x0000000000400000-0x0000000000581000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\OB Color Picker Setup Log.txt irsetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3172 irsetup.exe 3172 irsetup.exe 3172 irsetup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3336 wrote to memory of 3172 3336 a2844dfc7055b74393597e4a2e56ff44.exe 87 PID 3336 wrote to memory of 3172 3336 a2844dfc7055b74393597e4a2e56ff44.exe 87 PID 3336 wrote to memory of 3172 3336 a2844dfc7055b74393597e4a2e56ff44.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2844dfc7055b74393597e4a2e56ff44.exe"C:\Users\Admin\AppData\Local\Temp\a2844dfc7055b74393597e4a2e56ff44.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe"C:\Users\Admin\AppData\Local\Temp\_ir_sf_temp_0\irsetup.exe" __IRAOFF:662050 "__IRAFN:C:\Users\Admin\AppData\Local\Temp\a2844dfc7055b74393597e4a2e56ff44.exe" "__IRCT:1" "__IRTSS:0" "__IRSID:S-1-5-21-2200714112-3788720386-2559682836-1000"2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3172
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
566KB
MD53fe7c92dba5c9240b4ab0d6a87e6166a
SHA17980d7dffc073515b621834246dda33ab00c308d
SHA256a7818c1e0dad1cbba4d17809688887adeeafe940a3cb53a6aeabdfcd196f7258
SHA512bd2c87b2d02b80b90f744a101bbb9294b1d90650a338be725028e6649e46a759fa72032e80ffe911ae82b005b4d2394960e7b73ce7ad8fe3a70e8a47d2a7c98d