Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/02/2024, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
aa4f2a7de0272da31495494c93b96704.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa4f2a7de0272da31495494c93b96704.exe
Resource
win10v2004-20240226-en
General
-
Target
aa4f2a7de0272da31495494c93b96704.exe
-
Size
116KB
-
MD5
aa4f2a7de0272da31495494c93b96704
-
SHA1
06bfe510017b08b7a68d86fb6dacc04b8f81aa97
-
SHA256
182da00de9896029c80928b6fb429a97b9375459c7bef585ddac8537f72399e8
-
SHA512
922c9e887e1b18a0e6825d25e0e373fe19aa34f5857bf8d3fcd9a0ec016e10ff9f4770370a088510a5612160ddd2aa838d3a6a54210f7a048617a5b8a21ce0fb
-
SSDEEP
3072:iXbemwQ58MBxWWhpcsVDSRnoMbeHmXgYKiGQVj:iymwQqQxzXcemoMbeHDdQF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation aa4f2a7de0272da31495494c93b96704.exe -
Executes dropped EXE 1 IoCs
pid Process 3332 2.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\2.exe aa4f2a7de0272da31495494c93b96704.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3924 3332 WerFault.exe 86 -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 344 aa4f2a7de0272da31495494c93b96704.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 344 wrote to memory of 3332 344 aa4f2a7de0272da31495494c93b96704.exe 86 PID 344 wrote to memory of 3332 344 aa4f2a7de0272da31495494c93b96704.exe 86 PID 344 wrote to memory of 3332 344 aa4f2a7de0272da31495494c93b96704.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa4f2a7de0272da31495494c93b96704.exe"C:\Users\Admin\AppData\Local\Temp\aa4f2a7de0272da31495494c93b96704.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:344 -
C:\Windows\2.exe"C:\Windows\2.exe"2⤵
- Executes dropped EXE
PID:3332 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3332 -s 2243⤵
- Program crash
PID:3924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 3332 -ip 33321⤵PID:4844
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
101KB
MD5e1036ffefd02016fae038352c9d82200
SHA1dda7b8faa1d705c57890f9e65d1a668a4ab03222
SHA2568dc71dbddb1e699cee8b24312251ee9a0125d9a6647e34d28033156e0518674b
SHA512a64e01133d3d175e5b8bcf6ba28a8bd145ebd8e15c415fc64ebc86c44052101af834b1f93b5c1fd4db65b1874653ff6059173e1dc0bee0e0f1cc393a9b59921b