Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 05:28
Static task
static1
Behavioral task
behavioral1
Sample
baa14892eaaa0ef610fb3c1349529d61.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
baa14892eaaa0ef610fb3c1349529d61.exe
Resource
win10v2004-20240226-en
General
-
Target
baa14892eaaa0ef610fb3c1349529d61.exe
-
Size
33KB
-
MD5
baa14892eaaa0ef610fb3c1349529d61
-
SHA1
53b7eb9c9b6f40d9f3b3bd65f8d6213164645f14
-
SHA256
8d8a2f05c6cd7cf8887f7f434eedc5cf9338afd5bf40eaf321f1575ef9a86cd8
-
SHA512
b0b9d0ae1a6990c320f42ea5536e8b867cd80b1ddaf59efda357662cd753278d28addc768fbfca034555cea4c85dbb1f7f215af656d60da66d3ca6e5eaabfd55
-
SSDEEP
768:7ttttttttttMlryFstI/1qwya/HB5Jbn6ioaORAgpm/K4SbtkpDzNp/:INU4Ja/h5JbXORmSbtkND
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-513485977-2495024337-1260977654-1000\Control Panel\International\Geo\Nation baa14892eaaa0ef610fb3c1349529d61.exe -
resource yara_rule behavioral2/memory/2472-1-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2472 baa14892eaaa0ef610fb3c1349529d61.exe 2472 baa14892eaaa0ef610fb3c1349529d61.exe 2472 baa14892eaaa0ef610fb3c1349529d61.exe 2472 baa14892eaaa0ef610fb3c1349529d61.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2472 baa14892eaaa0ef610fb3c1349529d61.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2472 wrote to memory of 4968 2472 baa14892eaaa0ef610fb3c1349529d61.exe 90 PID 2472 wrote to memory of 4968 2472 baa14892eaaa0ef610fb3c1349529d61.exe 90 PID 2472 wrote to memory of 4968 2472 baa14892eaaa0ef610fb3c1349529d61.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\baa14892eaaa0ef610fb3c1349529d61.exe"C:\Users\Admin\AppData\Local\Temp\baa14892eaaa0ef610fb3c1349529d61.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BAA148~1.EXE > nul2⤵PID:4968
-