Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/03/2024, 10:51

General

  • Target

    b486869f5d0455cd0179ede65d334ddb.exe

  • Size

    115KB

  • MD5

    b486869f5d0455cd0179ede65d334ddb

  • SHA1

    89846a60ec8f3380781331c58d10e66886bd755f

  • SHA256

    2fa0de77949c1c80710b166f0658bf2c3a9cf5772dba6640d68807015c5dd78a

  • SHA512

    e701c883c398de4673e700f851cda070f728d9b4446362b2fcb6927a37834abf374f7254eddf0cf95d9db7271702ba233199d900f8de7bda0c221b1369fad45f

  • SSDEEP

    1536:E33gB2Aj5E33sIstpxNhB8AmlI9mSui8NDz9RBkChaNomb:GqzGsI0hgAmomSuiKDJRBkMxS

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 30 IoCs
  • Runs .reg file with regedit 3 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b486869f5d0455cd0179ede65d334ddb.exe
    "C:\Users\Admin\AppData\Local\Temp\b486869f5d0455cd0179ede65d334ddb.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3604
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Users\Admin\AppData\Local\Temp\As.reg
      2⤵
      • Runs .reg file with regedit
      PID:4340
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Users\Admin\AppData\Local\Temp\As.reg
      2⤵
      • Runs .reg file with regedit
      PID:3144
    • C:\Windows\SysWOW64\regedit.exe
      regedit /s C:\Users\Admin\AppData\Local\Temp\As.reg
      2⤵
      • Runs .reg file with regedit
      PID:1452
    • C:\Windows\WinHom.exe
      "C:\Windows\WinHom.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:4596
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c del "C:\Users\Admin\AppData\Local\Temp\b486869f5d0455cd0179ede65d334ddb.exe"
      2⤵
        PID:100

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\As.reg

      Filesize

      191B

      MD5

      8ce1e0204d80e9acfdf66075942b89de

      SHA1

      dd5ad43c5567e1cdb1a5fef5775d09ace0ed4ffe

      SHA256

      d804bfbe0fcda12c7eac87d50d97711d58d9233c9fa4dbc28df06fceee614fba

      SHA512

      f14d237ccdf68e09c71f0445bd3469ceb4147e02c85aec0346e69787999cc6c58b9bef15a3aa36ba533d55296cc400e0a193cf7dc3cf5ac5d1bcd17d42021f9f

    • C:\Users\Admin\AppData\Local\Temp\As.reg

      Filesize

      136B

      MD5

      29e90ccb597f9d84e6b8ed0573a5ed16

      SHA1

      0e596e582edad25cc0d110368a94e21b913a4611

      SHA256

      9b49398b2740012e3b439bb6d124d99b506e2c20ce34825ac56df4c3867ca876

      SHA512

      11eacace0cdf5d5c8d137acaa81f1fb03d13edb570e6fa4a77b686fe6e29c0f4502f7fa3f842bf7a979419b2dc1014ae204540aff3acca9a6c6ba9a49a7ab8ed

    • C:\Windows\WinHom.exe

      Filesize

      8KB

      MD5

      776e2ef225c629cb923d8aca937920e7

      SHA1

      64beb91d93aea435417ddd526d62d49229d96d79

      SHA256

      d7f692df91931910fd78a6595d066f345872611d7502839dc9ffced5dc37df54

      SHA512

      a03be154a6442b8588923811963220c247d720861946a830496321c6988602ee5d84fd97f1eb89017f166c0d7e61de687d5ffc0f5c9e6106adbbbae312dcd424

    • memory/3604-0-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/3604-21-0x0000000000400000-0x000000000043F000-memory.dmp

      Filesize

      252KB

    • memory/4596-17-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB

    • memory/4596-18-0x00000000001C0000-0x00000000001C1000-memory.dmp

      Filesize

      4KB

    • memory/4596-24-0x0000000000400000-0x0000000000407000-memory.dmp

      Filesize

      28KB