Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28-02-2024 03:40
Static task
static1
Behavioral task
behavioral1
Sample
aae96fd94101f404d269e64689567630.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aae96fd94101f404d269e64689567630.exe
Resource
win10v2004-20240226-en
General
-
Target
aae96fd94101f404d269e64689567630.exe
-
Size
2.8MB
-
MD5
aae96fd94101f404d269e64689567630
-
SHA1
1b04dea939130d55927f43edf9126bf33cd7400d
-
SHA256
bd23d91adef4ee625eca72a48a312d23ba446b5efd5ddf3525a3b791f2ac8701
-
SHA512
32270a2f63afe83774ff3d67c9e69fa4680db4a8c9846015abf9f84e82380b7ba45ccfa51281c5f21bc1f2add19fd17ba532cbdbe2df5a5d12126b33858bfcc6
-
SSDEEP
49152:zizqF2LZ1izVUSaHjiX8cR1uNjcm3NyO5dEZrjFRbkoatNm9UbQyJ4:zLF4sVUSC7c7wjh3NNqxj3+mqUyJ4
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation aae96fd94101f404d269e64689567630.exe -
Loads dropped DLL 1 IoCs
pid Process 2916 aae96fd94101f404d269e64689567630.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\SkinH_EL.dll aae96fd94101f404d269e64689567630.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000_Classes\Local Settings aae96fd94101f404d269e64689567630.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2916 aae96fd94101f404d269e64689567630.exe 2916 aae96fd94101f404d269e64689567630.exe 2916 aae96fd94101f404d269e64689567630.exe 2916 aae96fd94101f404d269e64689567630.exe 2916 aae96fd94101f404d269e64689567630.exe 2916 aae96fd94101f404d269e64689567630.exe 2916 aae96fd94101f404d269e64689567630.exe 2916 aae96fd94101f404d269e64689567630.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe Token: 33 2916 aae96fd94101f404d269e64689567630.exe Token: SeIncBasePriorityPrivilege 2916 aae96fd94101f404d269e64689567630.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2916 aae96fd94101f404d269e64689567630.exe 2916 aae96fd94101f404d269e64689567630.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2156 2916 aae96fd94101f404d269e64689567630.exe 94 PID 2916 wrote to memory of 2156 2916 aae96fd94101f404d269e64689567630.exe 94 PID 2916 wrote to memory of 2156 2916 aae96fd94101f404d269e64689567630.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\aae96fd94101f404d269e64689567630.exe"C:\Users\Admin\AppData\Local\Temp\aae96fd94101f404d269e64689567630.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\ʹÓÃ˵Ã÷!±Ø¿´!.txt2⤵PID:2156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
527B
MD5f1017a0bd85152f3860f14c86b5a9423
SHA1c5211bebd59dfa95ee6df6011b0db37edf6f9ef0
SHA256fcb15564f091119d26620ab5fbbff2f97323c52eb5f4fe6e8b7b28615ab215c6
SHA5122bae92d7f075c156cc82b72cab7c378cc3c648908d6c00f7715ea26a5341d21bd30c92e3ddd3589206579691aed6e7fbe8ce07b105f82bf263c3240856d5aa10
-
Filesize
688KB
MD5bd42ef63fc0f79fdaaeca95d62a96bbb
SHA197ca8ccb0e6f7ffeb05dc441b2427feb0b634033
SHA256573cf4e4dfa8fe51fc8b80b79cd626cb861260d26b6e4f627841e11b4dce2f48
SHA512431b5487003add16865538de428bf518046ee97ab6423d88f92cda4ff263f971c0cf3827049465b9288a219cc32698fd687939c7c648870dd7d8d6776735c93c