Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06-03-2024 04:46
Static task
static1
Behavioral task
behavioral1
Sample
b68b975556de8ef75eb75f399d4d110c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b68b975556de8ef75eb75f399d4d110c.exe
Resource
win10v2004-20240226-en
General
-
Target
b68b975556de8ef75eb75f399d4d110c.exe
-
Size
548KB
-
MD5
b68b975556de8ef75eb75f399d4d110c
-
SHA1
55284730c447ccad1bfa2ae6ee17afdc47448017
-
SHA256
28b55f54da3b83c3073dd90bee349019743536a52c117d8f939cf386d03d4739
-
SHA512
5a0a1aa15c8d6dcffbd00b4b720101b76a44209ea3563e4e9b72272e33f0417d6acc6c0820270b0eb0308a79afbbf3085aa8638c07a56606354c5e8c8248ebcd
-
SSDEEP
12288:qSMMnMMMMMtwa5EZYfpmveKaaMn42AvSPk2rCUQJ7x5Jev5r9LZbjDQec8:qSMMnMMMMMtBsYfpoaau45acTUqfJCFV
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation b68b975556de8ef75eb75f399d4d110c.exe -
Executes dropped EXE 1 IoCs
pid Process 2076 LkmHONmnjf.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\LkmHONmnjf = "C:\\ProgramData\\LkmHONmnjf.exe" b68b975556de8ef75eb75f399d4d110c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Software\Microsoft\Internet Explorer\Download b68b975556de8ef75eb75f399d4d110c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Internet Explorer\Download\CheckExeSignatures = "no" b68b975556de8ef75eb75f399d4d110c.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 1384 b68b975556de8ef75eb75f399d4d110c.exe 1384 b68b975556de8ef75eb75f399d4d110c.exe 1384 b68b975556de8ef75eb75f399d4d110c.exe 1384 b68b975556de8ef75eb75f399d4d110c.exe 2076 LkmHONmnjf.exe 2076 LkmHONmnjf.exe 2076 LkmHONmnjf.exe 2076 LkmHONmnjf.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1384 b68b975556de8ef75eb75f399d4d110c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1384 wrote to memory of 2076 1384 b68b975556de8ef75eb75f399d4d110c.exe 90 PID 1384 wrote to memory of 2076 1384 b68b975556de8ef75eb75f399d4d110c.exe 90 PID 1384 wrote to memory of 2076 1384 b68b975556de8ef75eb75f399d4d110c.exe 90 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableTaskMgr = "1" b68b975556de8ef75eb75f399d4d110c.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System b68b975556de8ef75eb75f399d4d110c.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\b68b975556de8ef75eb75f399d4d110c.exe"C:\Users\Admin\AppData\Local\Temp\b68b975556de8ef75eb75f399d4d110c.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1384 -
C:\ProgramData\LkmHONmnjf.exe"C:\ProgramData\LkmHONmnjf.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
548KB
MD5b68b975556de8ef75eb75f399d4d110c
SHA155284730c447ccad1bfa2ae6ee17afdc47448017
SHA25628b55f54da3b83c3073dd90bee349019743536a52c117d8f939cf386d03d4739
SHA5125a0a1aa15c8d6dcffbd00b4b720101b76a44209ea3563e4e9b72272e33f0417d6acc6c0820270b0eb0308a79afbbf3085aa8638c07a56606354c5e8c8248ebcd