Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 20:51
Static task
static1
Behavioral task
behavioral1
Sample
b828b68a024720e556959fc62715d513.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b828b68a024720e556959fc62715d513.exe
Resource
win10v2004-20240226-en
General
-
Target
b828b68a024720e556959fc62715d513.exe
-
Size
1.6MB
-
MD5
b828b68a024720e556959fc62715d513
-
SHA1
61fc5ecc013c5084522a5a4994d5280019c0c2ef
-
SHA256
460b518bc090022bccd81b2fdbbb0dbc6c778cf2b8d3873e81bcbf9ae4112c39
-
SHA512
51dc6ef9cad4fe5d0dcc461bcef2a653afb08152abac179a1e1aabcaa9aa6a7b3c52fc53e948a742b1cea37a9a4a868af2989a6d49a803200880b357cca4961e
-
SSDEEP
49152:5afxQ9o9FoeuaKeV/ZoO6ZRuI/WVrM/C0PinXBgJ:Q2+9eHshZ6y9M/6RgJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation b828b68a024720e556959fc62715d513.tmp -
Executes dropped EXE 2 IoCs
pid Process 4896 b828b68a024720e556959fc62715d513.tmp 1524 rkverify.exe -
Loads dropped DLL 4 IoCs
pid Process 4896 b828b68a024720e556959fc62715d513.tmp 1524 rkverify.exe 4896 b828b68a024720e556959fc62715d513.tmp 4896 b828b68a024720e556959fc62715d513.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe 1524 rkverify.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1884 wrote to memory of 4896 1884 b828b68a024720e556959fc62715d513.exe 90 PID 1884 wrote to memory of 4896 1884 b828b68a024720e556959fc62715d513.exe 90 PID 1884 wrote to memory of 4896 1884 b828b68a024720e556959fc62715d513.exe 90 PID 4896 wrote to memory of 1524 4896 b828b68a024720e556959fc62715d513.tmp 101 PID 4896 wrote to memory of 1524 4896 b828b68a024720e556959fc62715d513.tmp 101 PID 4896 wrote to memory of 1524 4896 b828b68a024720e556959fc62715d513.tmp 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\b828b68a024720e556959fc62715d513.exe"C:\Users\Admin\AppData\Local\Temp\b828b68a024720e556959fc62715d513.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\is-VO29B.tmp\b828b68a024720e556959fc62715d513.tmp"C:\Users\Admin\AppData\Local\Temp\is-VO29B.tmp\b828b68a024720e556959fc62715d513.tmp" /SL5="$601CA,1170460,54272,C:\Users\Admin\AppData\Local\Temp\b828b68a024720e556959fc62715d513.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\is-BJ2KB.tmp\rkverify.exe"C:\Users\Admin\AppData\Local\Temp\is-BJ2KB.tmp\rkverify.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1524
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD55ac09190daf249c3e93c3ac961067024
SHA1bad9c0d552d54310f669d66b549dcada90583812
SHA256f4934185f75518a13ef5425959f47516cc8467f513e838a82e749ffb782d7e23
SHA5122a87686c038e8a34f8e04a844726de564a08baeedc87632219b86f455d5222efe2ed7557fad9658627e304d916a75cfcb3c9dede4e72057a070f64370aa52f39
-
Filesize
1KB
MD51044bd008f69b4d698c2f017a866e548
SHA19f17ebcdfdf5d8609bd539720486a2e867f48a2e
SHA2567ad44ed863498374c67110cbef7af587606b03735c922bc066a840c7ea728951
SHA5126b3d66251a24bcb6d317fb947250c6e904a75de5efe86dd874d70b1117ff7f982129f7fc231499b1c8eb465c83241308b13356900ea492f61bd0e595261fc36c
-
Filesize
49KB
MD502ecc74f7f91e9ffd84de708683236a6
SHA13532de0b77df8b0fc89e9c7eddec3fa71f98f5a2
SHA25630ad8a0e1cee091ca48c771adb2e76baf1a7d54b9f60dc47f54dfdc2d6f6691e
SHA512a3fdaa651f82428395bc412a2a04fce673768d3ef088b3748addf337d95464eb141ae7c286bff5c705eae05dd7b38207629588ae7e89ada15269463cd7acf541
-
Filesize
268KB
MD5020ce95075f8c93e6cc957953d7f4589
SHA1e192a200e36974b8e0637230a8cb5905090f7555
SHA256df9d068202c060a898cd441d5c170686cd9c2774a37cfda3ea10abc428e20ad3
SHA512fb74170ed9b5ee078a176540c198513ed3a8c2e587fbcbf6d2384f840f0b6a2637fd20b6a01b2caf6e92e5f592d517b4733d34fdb349fd770eb04e1eac769170
-
Filesize
688KB
MD5c765336f0dcf4efdcc2101eed67cd30c
SHA1fa0279f59738c5aa3b6b20106e109ccd77f895a7
SHA256c5177fdc6031728e10141745cd69edbc91c92d14411a2dec6e8e8caa4f74ab28
SHA51206a67ac37c20897967e2cad453793a6ef1c7804d4c578404f845daa88c859b15b0acb51642e6ad23ca6ba6549b02d5f6c98b1fa402004bdbf9d646abab7ec891