Analysis
-
max time kernel
147s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
a76da3ab31bd142881d3cc05b3903dba.exe
Resource
win7-20240221-en
General
-
Target
a76da3ab31bd142881d3cc05b3903dba.exe
-
Size
1.9MB
-
MD5
a76da3ab31bd142881d3cc05b3903dba
-
SHA1
8b168865e07098254456c4bde49f0892e42ae2b1
-
SHA256
84c32cb403361a5d8d8117cf941b89c6c819ac453a0e1f411eb5c2952cc35e7c
-
SHA512
064a326303e24160ef5a27fa4843d98c1df545e5bcd077b25dfd1abd5cb7ee7a142edf4176a16ff0972ebcaada9604cd23ee14c01251c223336260669a010fff
-
SSDEEP
24576:CjmjQcndRKZCy2BrhCeU2i2cJijFbCBTPmiY05tJMSQp5ysA7Yg1nLkziEmTxp+x:vQmXDFBU2iIBb0xY/6sUYYRLDIP
Malware Config
Extracted
bitrat
1.38
79.134.225.90:4898
-
communication_password
7fcc5163240be484c36ebae222f656b3
-
tor_process
tor
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation a76da3ab31bd142881d3cc05b3903dba.exe -
Executes dropped EXE 2 IoCs
pid Process 3564 TxeJrqbFpAA9jft3.exe 5068 6Ec59LVCWlXgX51C.exe -
resource yara_rule behavioral2/files/0x000200000001f656-4.dat upx behavioral2/memory/3564-8-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3564-29-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3564-35-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3564-38-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3564-41-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3564-43-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3564-46-0x0000000000400000-0x00000000007E4000-memory.dmp upx behavioral2/memory/3564-49-0x0000000000400000-0x00000000007E4000-memory.dmp upx -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 3564 TxeJrqbFpAA9jft3.exe 3564 TxeJrqbFpAA9jft3.exe 3564 TxeJrqbFpAA9jft3.exe 3564 TxeJrqbFpAA9jft3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeShutdownPrivilege 3564 TxeJrqbFpAA9jft3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3564 TxeJrqbFpAA9jft3.exe 3564 TxeJrqbFpAA9jft3.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5052 wrote to memory of 3564 5052 a76da3ab31bd142881d3cc05b3903dba.exe 89 PID 5052 wrote to memory of 3564 5052 a76da3ab31bd142881d3cc05b3903dba.exe 89 PID 5052 wrote to memory of 3564 5052 a76da3ab31bd142881d3cc05b3903dba.exe 89 PID 5052 wrote to memory of 5068 5052 a76da3ab31bd142881d3cc05b3903dba.exe 91 PID 5052 wrote to memory of 5068 5052 a76da3ab31bd142881d3cc05b3903dba.exe 91 PID 5052 wrote to memory of 5068 5052 a76da3ab31bd142881d3cc05b3903dba.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\a76da3ab31bd142881d3cc05b3903dba.exe"C:\Users\Admin\AppData\Local\Temp\a76da3ab31bd142881d3cc05b3903dba.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\TxeJrqbFpAA9jft3.exe"C:\Users\Admin\AppData\Local\Temp\TxeJrqbFpAA9jft3.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3564
-
-
C:\Users\Admin\AppData\Local\Temp\6Ec59LVCWlXgX51C.exe"C:\Users\Admin\AppData\Local\Temp\6Ec59LVCWlXgX51C.exe"2⤵
- Executes dropped EXE
PID:5068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
219KB
MD560ab706a84ebcef719682d1426e04474
SHA16911676b3324624935f5717a4243167d61c937d3
SHA256175fdacc1bf745a3fc9274648cb152b0c15127f1a4441ca0346b9bc66d4acff5
SHA512a09f224489543d0899561db16415474c5be1b600c7d0e4b01ca5367643559af5a80cdfa29220a091da7664da0edb747b2e6520a693637623756fe47f31936161
-
Filesize
1.4MB
MD560b16295c2f7b34128b7135af220c142
SHA1a2211b6e1d2708316c3086398df6d56a52494d5e
SHA256e8cb7abe387fa940a5b97a00b50f30ddb613dbd31beae4005dee56232c7fb1b8
SHA5123e0000a5ca8e5e797974145e50ab1213b0d8e4ecfaf38fa711f58c8836f13edd86b93aaf1e70a6f494cf87d676d2598f49f91adcbea66b2ec9816c14b270d996