Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 08:18
Static task
static1
Behavioral task
behavioral1
Sample
b43c94a54e52b246139d70534a3321d7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b43c94a54e52b246139d70534a3321d7.exe
Resource
win10v2004-20240226-en
General
-
Target
b43c94a54e52b246139d70534a3321d7.exe
-
Size
34KB
-
MD5
b43c94a54e52b246139d70534a3321d7
-
SHA1
46899569f33d9682c8f48a92cc0d73e59f72b9fd
-
SHA256
c26f2edf86555e23ccfeb0664744f1da32446310d50d9439edb9080d8bea562a
-
SHA512
9a96fcdc6f94950b39e6f03a19d198f2697a67ce9d2eb6e70958a61778c206ae001f549ef3b0fca61057eb7794e451f7823b4738c8ea96f775a819991ab0ab0e
-
SSDEEP
768:m/tYCIW/YZGtv0zbN2D664B6PEUrC+GvPVLc:eFIWgGCzbN2mr6PrJGvi
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\81893b3c.exe," b43c94a54e52b246139d70534a3321d7.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation b43c94a54e52b246139d70534a3321d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4228 wrote to memory of 1324 4228 b43c94a54e52b246139d70534a3321d7.exe 92 PID 4228 wrote to memory of 1324 4228 b43c94a54e52b246139d70534a3321d7.exe 92 PID 4228 wrote to memory of 1324 4228 b43c94a54e52b246139d70534a3321d7.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\b43c94a54e52b246139d70534a3321d7.exe"C:\Users\Admin\AppData\Local\Temp\b43c94a54e52b246139d70534a3321d7.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\B43C94~1.EXE >> NUL2⤵PID:1324
-