Analysis
-
max time kernel
145s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
25/02/2024, 10:33
Static task
static1
Behavioral task
behavioral1
Sample
a38f376a437793ccffc4fd6fda4f828d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a38f376a437793ccffc4fd6fda4f828d.exe
Resource
win10v2004-20240221-en
General
-
Target
a38f376a437793ccffc4fd6fda4f828d.exe
-
Size
81KB
-
MD5
a38f376a437793ccffc4fd6fda4f828d
-
SHA1
07f8deae8c687c2cbe400804ef02971217ccfe00
-
SHA256
1b4c4274c152abaa70081d7702d49d9d2be48695701c0fb0d753ea9c84adb029
-
SHA512
c2e95e7d7d741c36ccf121f0c860e8817179b69806e0a9555833a665c23d16699976d9302c2ac531e85e11dfbd4e4ea4dfd181fff6e5a5c45bd4b3d7faea14a8
-
SSDEEP
1536:7cl7zKDfLplVKcBDdbNzfLVm2wm3e6XVTWfsvFM9sYf8jm3s20mRuYWlij:7wzGfVKcD7LI2wmHVWfsdM9sYkkluYWl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\Control Panel\International\Geo\Nation a38f376a437793ccffc4fd6fda4f828d.exe -
Executes dropped EXE 1 IoCs
pid Process 1944 msiconf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1712835645-2080934712-2142796781-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\msiexec.exe = "msiconf.exe" a38f376a437793ccffc4fd6fda4f828d.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\msiconf.exe a38f376a437793ccffc4fd6fda4f828d.exe File created C:\Windows\SysWOW64\msiconf.exe msiconf.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64 a38f376a437793ccffc4fd6fda4f828d.exe File opened for modification C:\Windows\SysWOW64 msiconf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1028 wrote to memory of 1944 1028 a38f376a437793ccffc4fd6fda4f828d.exe 90 PID 1028 wrote to memory of 1944 1028 a38f376a437793ccffc4fd6fda4f828d.exe 90 PID 1028 wrote to memory of 1944 1028 a38f376a437793ccffc4fd6fda4f828d.exe 90 PID 1028 wrote to memory of 3540 1028 a38f376a437793ccffc4fd6fda4f828d.exe 91 PID 1028 wrote to memory of 3540 1028 a38f376a437793ccffc4fd6fda4f828d.exe 91 PID 1028 wrote to memory of 3540 1028 a38f376a437793ccffc4fd6fda4f828d.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a38f376a437793ccffc4fd6fda4f828d.exe"C:\Users\Admin\AppData\Local\Temp\a38f376a437793ccffc4fd6fda4f828d.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\msiconf.exeC:\Windows\system32\msiconf.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\A38F37~1.EXE >> nul2⤵PID:3540
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14B
MD59b3f9a963a6fa0dd8654fcbb1fe8c787
SHA1087c9a28cd822c703c1545e8f8edb9f23f5e160a
SHA25667c71ec4ac6068796fa5a7624a178e3f4a33ac4c273e8ed30a9c7942d47b3d39
SHA51241962a180bd11ee65762b714ddbd59663702734e7be7d01afb32e9e2f7592031b5dd3b1cf329368148ebb06a5853900528eda6c3562455f004835885c17b2753
-
Filesize
81KB
MD5a38f376a437793ccffc4fd6fda4f828d
SHA107f8deae8c687c2cbe400804ef02971217ccfe00
SHA2561b4c4274c152abaa70081d7702d49d9d2be48695701c0fb0d753ea9c84adb029
SHA512c2e95e7d7d741c36ccf121f0c860e8817179b69806e0a9555833a665c23d16699976d9302c2ac531e85e11dfbd4e4ea4dfd181fff6e5a5c45bd4b3d7faea14a8