Analysis
-
max time kernel
164s -
max time network
170s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
24/02/2024, 20:43
Static task
static1
Behavioral task
behavioral1
Sample
a2b63d9a2848033bc8f0bfeb3cbeacd2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2b63d9a2848033bc8f0bfeb3cbeacd2.exe
Resource
win10v2004-20240221-en
General
-
Target
a2b63d9a2848033bc8f0bfeb3cbeacd2.exe
-
Size
332KB
-
MD5
a2b63d9a2848033bc8f0bfeb3cbeacd2
-
SHA1
d802296f700432f7da660840fe19f2c82a1ed6db
-
SHA256
5c877175974a5fd36d27ce10fc0ca70aa20555779c6098b19d35431575f57dc0
-
SHA512
2ce892a16e40d48e4122989efc3fc8b7d844109e94f1141a82f309081eae9e7437ddbbc13c5d4e38ced75a07c8071835a796c91306bf4b2cbb7a229409e56485
-
SSDEEP
6144:3cWMJJhqryYP/daqmhzya865UMlFSwJ91gVMHTBYcSojEVWS5IvaIr:3czJJhqrVPlKwaoMlEmuKTBFljq5KaIr
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3538781373-1545967067-4263767959-1000\Control Panel\International\Geo\Nation a2b63d9a2848033bc8f0bfeb3cbeacd2.exe -
Executes dropped EXE 2 IoCs
pid Process 1404 123.exe 2656 asd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2656 asd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1404 123.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4972 wrote to memory of 1404 4972 a2b63d9a2848033bc8f0bfeb3cbeacd2.exe 93 PID 4972 wrote to memory of 1404 4972 a2b63d9a2848033bc8f0bfeb3cbeacd2.exe 93 PID 4972 wrote to memory of 1404 4972 a2b63d9a2848033bc8f0bfeb3cbeacd2.exe 93 PID 4972 wrote to memory of 2656 4972 a2b63d9a2848033bc8f0bfeb3cbeacd2.exe 94 PID 4972 wrote to memory of 2656 4972 a2b63d9a2848033bc8f0bfeb3cbeacd2.exe 94 PID 4972 wrote to memory of 2656 4972 a2b63d9a2848033bc8f0bfeb3cbeacd2.exe 94 PID 2656 wrote to memory of 3336 2656 asd.exe 95 PID 2656 wrote to memory of 3336 2656 asd.exe 95 PID 2656 wrote to memory of 3336 2656 asd.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a2b63d9a2848033bc8f0bfeb3cbeacd2.exe"C:\Users\Admin\AppData\Local\Temp\a2b63d9a2848033bc8f0bfeb3cbeacd2.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\123.exe"C:\Users\Admin\AppData\Local\Temp\123.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1404
-
-
C:\Users\Admin\AppData\Local\Temp\asd.exe"C:\Users\Admin\AppData\Local\Temp\asd.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\asd.exeC:\Users\Admin\AppData\Local\Temp\asd.exe3⤵PID:3336
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
316KB
MD54505ec35dc42664b86dd3cac8199d4d8
SHA1b3532878202943ab221ebc0cbb318b9829403391
SHA25648077e97abafe0c7c33ab5371416d745e5fe7967b5980ffeb3a1d1150053bdf3
SHA51205a5bb9830e832ca05cb5f043a449d80e511589a2f159a40233ff236405c3cf5893b016c629ca6f235ae9234cc6bdfdda0c912ff788c5db318345d6d5913b5f6
-
Filesize
2KB
MD563d8d7d597bc262644d9147bd4983e32
SHA118d08e1b59af89b02a94f668b7102d9851178410
SHA25632cb2a88ab9d41d10575932947bdf8d7980ba1f3c7c9518f9a6167fceb49d7bf
SHA5129cb69feb0ad2d773115df65da61a467b2e89fbe390121a785567bb85459c965a191cfc75b077c32424109e315dba5c6ef3606356885c6abae0b67cf53421c1ad
-
Filesize
250KB
MD502eb637e08b5466caef64698cae0b1e2
SHA1c1718e569d3305103890eeb0a1fe38d587f657f9
SHA256b28c73d69d32272a4c6b507796794381a991550b742089fddf6ea4b6e9ee20d8
SHA512370317f3d615fcd404f535bdf2bf2880cf2087835b1b121988b146b4a1fb4ea5c71ad02e591113d554e09340d795cfe499b561c6487852a73237f137fa61f3c4