Analysis
-
max time kernel
92s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25-02-2024 07:46
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20240221-en
General
-
Target
file.exe
-
Size
2.3MB
-
MD5
f14b54c6e41545c8ba51629183431d1d
-
SHA1
758aa4668d2206d3a80308ecd2fecae459fed07e
-
SHA256
015a36adeafc759d8034813bff44559ef28060351dd0e8750b87fdf12802e82f
-
SHA512
d25744c0a1185205641d3f0199bea923d4224e43ea91f371782424339c4d56bd92efe41de3c3f026bf72f5d1e6d324aff3a1d737fade6ae56d2aa3632f899fee
-
SSDEEP
49152:anGImUlx7X/pQ2P6p6rVzCOKPec313JYbcBKUd+IAWgLqGWQy:aGIfXha29COKWc31ZkcBuIA/Li
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2200714112-3788720386-2559682836-1000\Control Panel\International\Geo\Nation file.exe -
Loads dropped DLL 2 IoCs
Processes:
rundll32.exerundll32.exepid process 1812 rundll32.exe 4728 rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
file.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2200714112-3788720386-2559682836-1000_Classes\Local Settings file.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
file.execontrol.exerundll32.exeRunDll32.exedescription pid process target process PID 3316 wrote to memory of 4940 3316 file.exe control.exe PID 3316 wrote to memory of 4940 3316 file.exe control.exe PID 3316 wrote to memory of 4940 3316 file.exe control.exe PID 4940 wrote to memory of 1812 4940 control.exe rundll32.exe PID 4940 wrote to memory of 1812 4940 control.exe rundll32.exe PID 4940 wrote to memory of 1812 4940 control.exe rundll32.exe PID 1812 wrote to memory of 3304 1812 rundll32.exe RunDll32.exe PID 1812 wrote to memory of 3304 1812 rundll32.exe RunDll32.exe PID 3304 wrote to memory of 4728 3304 RunDll32.exe rundll32.exe PID 3304 wrote to memory of 4728 3304 RunDll32.exe rundll32.exe PID 3304 wrote to memory of 4728 3304 RunDll32.exe rundll32.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\SysWOW64\control.exe"C:\Windows\System32\control.exe" "C:\Users\Admin\AppData\Local\Temp\_d8c4M1.CPL",2⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\system32\rundll32.exe" Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\_d8c4M1.CPL",3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Windows\system32\RunDll32.exeC:\Windows\system32\RunDll32.exe Shell32.dll,Control_RunDLL "C:\Users\Admin\AppData\Local\Temp\_d8c4M1.CPL",4⤵
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe" "C:\Windows\SysWOW64\shell32.dll",#44 "C:\Users\Admin\AppData\Local\Temp\_d8c4M1.CPL",5⤵
- Loads dropped DLL
PID:4728
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.0MB
MD54516fffb265c3011e2750a255b382363
SHA1cd74ae4c5424e4f529e29bbd22c4bddadcbdf7dd
SHA2563dddf9d138c67c29b932605e99bcfbb712e5dc219df9d845c5aaf25bbbc6ba08
SHA5123c9a4fda5d7a52b660a05d2a82f9f00332aa5bee545d8668653260ae257a608d1b2ff11bc4ffbd16797e6246b3fa02a222c183f0556e797273e19b037b7c47c3