Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2024, 10:51
Behavioral task
behavioral1
Sample
b486869f5d0455cd0179ede65d334ddb.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b486869f5d0455cd0179ede65d334ddb.exe
Resource
win10v2004-20240226-en
General
-
Target
b486869f5d0455cd0179ede65d334ddb.exe
-
Size
115KB
-
MD5
b486869f5d0455cd0179ede65d334ddb
-
SHA1
89846a60ec8f3380781331c58d10e66886bd755f
-
SHA256
2fa0de77949c1c80710b166f0658bf2c3a9cf5772dba6640d68807015c5dd78a
-
SHA512
e701c883c398de4673e700f851cda070f728d9b4446362b2fcb6927a37834abf374f7254eddf0cf95d9db7271702ba233199d900f8de7bda0c221b1369fad45f
-
SSDEEP
1536:E33gB2Aj5E33sIstpxNhB8AmlI9mSui8NDz9RBkChaNomb:GqzGsI0hgAmomSuiKDJRBkMxS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation b486869f5d0455cd0179ede65d334ddb.exe -
Executes dropped EXE 1 IoCs
pid Process 4596 WinHom.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\WinHom.exe b486869f5d0455cd0179ede65d334ddb.exe File created C:\Windows\As.ico b486869f5d0455cd0179ede65d334ddb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8B9F522-3C24-11D4-97C2-0080C882687E}\Shell\ÊôÐÔ(&D)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8B9F522-3C24-11D4-97C2-0080C882687E}\Shell\Open(&O) b486869f5d0455cd0179ede65d334ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\DefaultIcon\ = "C:\\Windows\\As.ico" b486869f5d0455cd0179ede65d334ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8B9F522-3C24-11D4-97C2-0080C882687E}\Shell\Open(&O)\Command\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE %1 h%t%t%p:%//%w%w%w.%y%a%o%ch%a.l%a" b486869f5d0455cd0179ede65d334ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8B9F522-3C24-11D4-97C2-0080C882687E}\Shell\Open(&O)\ = "Open(&O)" b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Shell\Open(&O)\Command b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Shell\Open(&O) b486869f5d0455cd0179ede65d334ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8B9F522-3C24-11D4-97C2-0080C882687E}\ = "Internet Explorer" b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8B9F522-3C24-11D4-97C2-0080C882687E}\Shell b486869f5d0455cd0179ede65d334ddb.exe Set value (str) \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\ b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Shell\ÊôÐÔ(&D)\Command b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Shell b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8B9F522-3C24-11D4-97C2-0080C882687E}\DefaultIcon b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8B9F522-3C24-11D4-97C2-0080C882687E}\Shell\ÊôÐÔ(&D) b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\DefaultIcon b486869f5d0455cd0179ede65d334ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Shell\Open(&O)\Command\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE " b486869f5d0455cd0179ede65d334ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Shell\Open(&O)\ = "Open(&O)" b486869f5d0455cd0179ede65d334ddb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\ShellFolder\Attributes = "0" b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8B9F522-3C24-11D4-97C2-0080C882687E} b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8B9F522-3C24-11D4-97C2-0080C882687E}\Shell\ÊôÐÔ(&D)\Command b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8B9F522-3C24-11D4-97C2-0080C882687E}\ShellFolder b486869f5d0455cd0179ede65d334ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8B9F522-3C24-11D4-97C2-0080C882687E}\DefaultIcon\ = "C:\\Program Files\\Internet Explorer\\IEXPLORE.EXE" b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000_Classes\ b486869f5d0455cd0179ede65d334ddb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Shell\ÊôÐÔ(&D)\Command\ = "Rundll32.exe Shell32.dll,Control_RunDLL Inetcpl.cpl" b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ShellFolder b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node b486869f5d0455cd0179ede65d334ddb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8B9F522-3C24-11D4-97C2-0080C882687E}\ShellFolder\Attributes = "0" b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Shell\ÊôÐÔ(&D) b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID b486869f5d0455cd0179ede65d334ddb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8B9F522-3C24-11D4-97C2-0080C882687E}\Shell\Open(&O)\Command b486869f5d0455cd0179ede65d334ddb.exe -
Runs .reg file with regedit 3 IoCs
pid Process 4340 regedit.exe 3144 regedit.exe 1452 regedit.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4596 WinHom.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3604 wrote to memory of 4340 3604 b486869f5d0455cd0179ede65d334ddb.exe 89 PID 3604 wrote to memory of 4340 3604 b486869f5d0455cd0179ede65d334ddb.exe 89 PID 3604 wrote to memory of 4340 3604 b486869f5d0455cd0179ede65d334ddb.exe 89 PID 3604 wrote to memory of 3144 3604 b486869f5d0455cd0179ede65d334ddb.exe 90 PID 3604 wrote to memory of 3144 3604 b486869f5d0455cd0179ede65d334ddb.exe 90 PID 3604 wrote to memory of 3144 3604 b486869f5d0455cd0179ede65d334ddb.exe 90 PID 3604 wrote to memory of 1452 3604 b486869f5d0455cd0179ede65d334ddb.exe 91 PID 3604 wrote to memory of 1452 3604 b486869f5d0455cd0179ede65d334ddb.exe 91 PID 3604 wrote to memory of 1452 3604 b486869f5d0455cd0179ede65d334ddb.exe 91 PID 3604 wrote to memory of 4596 3604 b486869f5d0455cd0179ede65d334ddb.exe 92 PID 3604 wrote to memory of 4596 3604 b486869f5d0455cd0179ede65d334ddb.exe 92 PID 3604 wrote to memory of 4596 3604 b486869f5d0455cd0179ede65d334ddb.exe 92 PID 3604 wrote to memory of 100 3604 b486869f5d0455cd0179ede65d334ddb.exe 93 PID 3604 wrote to memory of 100 3604 b486869f5d0455cd0179ede65d334ddb.exe 93 PID 3604 wrote to memory of 100 3604 b486869f5d0455cd0179ede65d334ddb.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\b486869f5d0455cd0179ede65d334ddb.exe"C:\Users\Admin\AppData\Local\Temp\b486869f5d0455cd0179ede65d334ddb.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\As.reg2⤵
- Runs .reg file with regedit
PID:4340
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\As.reg2⤵
- Runs .reg file with regedit
PID:3144
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Users\Admin\AppData\Local\Temp\As.reg2⤵
- Runs .reg file with regedit
PID:1452
-
-
C:\Windows\WinHom.exe"C:\Windows\WinHom.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4596
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\b486869f5d0455cd0179ede65d334ddb.exe"2⤵PID:100
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
191B
MD58ce1e0204d80e9acfdf66075942b89de
SHA1dd5ad43c5567e1cdb1a5fef5775d09ace0ed4ffe
SHA256d804bfbe0fcda12c7eac87d50d97711d58d9233c9fa4dbc28df06fceee614fba
SHA512f14d237ccdf68e09c71f0445bd3469ceb4147e02c85aec0346e69787999cc6c58b9bef15a3aa36ba533d55296cc400e0a193cf7dc3cf5ac5d1bcd17d42021f9f
-
Filesize
136B
MD529e90ccb597f9d84e6b8ed0573a5ed16
SHA10e596e582edad25cc0d110368a94e21b913a4611
SHA2569b49398b2740012e3b439bb6d124d99b506e2c20ce34825ac56df4c3867ca876
SHA51211eacace0cdf5d5c8d137acaa81f1fb03d13edb570e6fa4a77b686fe6e29c0f4502f7fa3f842bf7a979419b2dc1014ae204540aff3acca9a6c6ba9a49a7ab8ed
-
Filesize
8KB
MD5776e2ef225c629cb923d8aca937920e7
SHA164beb91d93aea435417ddd526d62d49229d96d79
SHA256d7f692df91931910fd78a6595d066f345872611d7502839dc9ffced5dc37df54
SHA512a03be154a6442b8588923811963220c247d720861946a830496321c6988602ee5d84fd97f1eb89017f166c0d7e61de687d5ffc0f5c9e6106adbbbae312dcd424