Analysis
-
max time kernel
90s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08-03-2024 10:34
Static task
static1
Behavioral task
behavioral1
Sample
bb0a44e79b092106f1f55f80f5a5554c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb0a44e79b092106f1f55f80f5a5554c.exe
Resource
win10v2004-20240226-en
General
-
Target
bb0a44e79b092106f1f55f80f5a5554c.exe
-
Size
320KB
-
MD5
bb0a44e79b092106f1f55f80f5a5554c
-
SHA1
63025a44274e6d89e95ed9c5cb79f8c3a371528b
-
SHA256
17a5e7c0ddc39e588648b9e84e2a4c6ee8243558a6bacc3eceedb8c57ae13e04
-
SHA512
12f82d46c5ac7a78742bc539018461d4699fd2297cf4adbf00d47d57452f2d013aab03644ec35398c66a5607a4ee1839c4287311947699bd92e3581af45fa0e3
-
SSDEEP
6144:tKAWzXyGLOeQS1+O8+Z6drfcF0NaanahA0z0CPI4O7c5l:tdWzXyGLOeb846djcFQEZOo
Malware Config
Extracted
44caliber
https://discordapp.com/api/webhooks/873206223183433798/33HU-Ko_-yJdLbMSPdpbWYalHeLEd56rzBIo2fa7IV1r_T7BoM0H46slF9msGWiznz2K
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation bb0a44e79b092106f1f55f80f5a5554c.exe -
Executes dropped EXE 1 IoCs
pid Process 2216 aorbHRzPIL.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aorbHRzPIL = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aorbHRzPIL.exe" aorbHRzPIL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\aorbHRzPIL = "C:\\Users\\Admin\\AppData\\Local\\Temp\\aorbHRzPIL.exe" aorbHRzPIL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1232 bb0a44e79b092106f1f55f80f5a5554c.exe Token: SeDebugPrivilege 2216 aorbHRzPIL.exe Token: SeBackupPrivilege 1412 dw20.exe Token: SeBackupPrivilege 1412 dw20.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1232 wrote to memory of 2216 1232 bb0a44e79b092106f1f55f80f5a5554c.exe 91 PID 1232 wrote to memory of 2216 1232 bb0a44e79b092106f1f55f80f5a5554c.exe 91 PID 2216 wrote to memory of 1412 2216 aorbHRzPIL.exe 93 PID 2216 wrote to memory of 1412 2216 aorbHRzPIL.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\bb0a44e79b092106f1f55f80f5a5554c.exe"C:\Users\Admin\AppData\Local\Temp\bb0a44e79b092106f1f55f80f5a5554c.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\aorbHRzPIL.exe"C:\Users\Admin\AppData\Local\Temp\aorbHRzPIL.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exedw20.exe -x -s 8443⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
320KB
MD5bb0a44e79b092106f1f55f80f5a5554c
SHA163025a44274e6d89e95ed9c5cb79f8c3a371528b
SHA25617a5e7c0ddc39e588648b9e84e2a4c6ee8243558a6bacc3eceedb8c57ae13e04
SHA51212f82d46c5ac7a78742bc539018461d4699fd2297cf4adbf00d47d57452f2d013aab03644ec35398c66a5607a4ee1839c4287311947699bd92e3581af45fa0e3