Analysis
-
max time kernel
156s -
max time network
178s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 02:28
Static task
static1
Behavioral task
behavioral1
Sample
bd6e80a157f36680184eff16db827de5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd6e80a157f36680184eff16db827de5.exe
Resource
win10v2004-20240226-en
General
-
Target
bd6e80a157f36680184eff16db827de5.exe
-
Size
173KB
-
MD5
bd6e80a157f36680184eff16db827de5
-
SHA1
9ab9eba21c522638973e606233b2a9ac253b1005
-
SHA256
2dfd24911df71284d1d661f2b88b222c1e9e00f97b48b02cde9876908a67cd98
-
SHA512
8b96cf866dca774e5d25d7d38d1002baecc95feaeb73e16bc160d554cb47cd2992b76c91a4c962ac67eab839b76308baf777cf3e9fcc9389aa1f352ac3c900d6
-
SSDEEP
3072:l4jg7Y+U+jUXQuXxp8HGlmEKuJn5CKYzOhNA/s3GM+VvCfl1BLgGIczjx25yZB22:le0UXQuXj8mMoJnkz6NMFMJpgGIOU5Md
Malware Config
Signatures
-
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" IEXPL0RE.EXE -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation bd6e80a157f36680184eff16db827de5.exe Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation IEXPL0RE.EXE -
Executes dropped EXE 2 IoCs
pid Process 4704 IEXPL0RE.EXE 2244 SVCH0ST.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\QQ2007 = "C:\\Windows\\system32\\IEXPL0RE.EXE" IEXPL0RE.EXE -
Drops autorun.inf file 1 TTPs 6 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created C:\AUTORUN.INF IEXPL0RE.EXE File opened for modification D:\AUTORUN.INF IEXPL0RE.EXE File created D:\AUTORUN.INF IEXPL0RE.EXE File opened for modification F:\AUTORUN.INF IEXPL0RE.EXE File created F:\AUTORUN.INF IEXPL0RE.EXE File opened for modification C:\AUTORUN.INF IEXPL0RE.EXE -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\IEXPL0RE.EXE bd6e80a157f36680184eff16db827de5.exe File created C:\Windows\SysWOW64\IEXPL0RE.EXE bd6e80a157f36680184eff16db827de5.exe File opened for modification C:\Windows\SysWOW64\IEXPL0RE.EXE IEXPL0RE.EXE File created C:\Windows\SysWOW64\IEXPL0RE.EXE IEXPL0RE.EXE File opened for modification C:\Windows\SysWOW64\SVCH0ST.EXE IEXPL0RE.EXE File created C:\Windows\SysWOW64\SVCH0ST.EXE IEXPL0RE.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ IEXPL0RE.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ bd6e80a157f36680184eff16db827de5.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4704 IEXPL0RE.EXE 4704 IEXPL0RE.EXE 4704 IEXPL0RE.EXE 4704 IEXPL0RE.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 4704 IEXPL0RE.EXE 4704 IEXPL0RE.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 4704 IEXPL0RE.EXE 4704 IEXPL0RE.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 4704 IEXPL0RE.EXE 4704 IEXPL0RE.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 4704 IEXPL0RE.EXE 4704 IEXPL0RE.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 4704 IEXPL0RE.EXE 4704 IEXPL0RE.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 4704 IEXPL0RE.EXE 4704 IEXPL0RE.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE 2244 SVCH0ST.EXE -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4432 wrote to memory of 4704 4432 bd6e80a157f36680184eff16db827de5.exe 90 PID 4432 wrote to memory of 4704 4432 bd6e80a157f36680184eff16db827de5.exe 90 PID 4432 wrote to memory of 4704 4432 bd6e80a157f36680184eff16db827de5.exe 90 PID 4704 wrote to memory of 2244 4704 IEXPL0RE.EXE 91 PID 4704 wrote to memory of 2244 4704 IEXPL0RE.EXE 91 PID 4704 wrote to memory of 2244 4704 IEXPL0RE.EXE 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd6e80a157f36680184eff16db827de5.exe"C:\Users\Admin\AppData\Local\Temp\bd6e80a157f36680184eff16db827de5.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\IEXPL0RE.EXE"C:\Windows\system32\IEXPL0RE.EXE"2⤵
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\SVCH0ST.EXE"C:\Windows\system32\SVCH0ST.EXE"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2244
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172B
MD5f1a331bd21e751d17e18c493e559906d
SHA1297d8b55fe35594151ae10993aa391b23432c1d0
SHA25651e6e99482070e04c4ba403916871079b3f3c4fabcb0374a530dffa6032e8de1
SHA51231565cfaff1c25898db95f2fd819c19d619ca5af2ebf8f228108091af3f8503547b5b8d186da2fa5b23161f356b8c7b2d6d953e2a619f3341c102d20d1ed5602
-
Filesize
173KB
MD5bd6e80a157f36680184eff16db827de5
SHA19ab9eba21c522638973e606233b2a9ac253b1005
SHA2562dfd24911df71284d1d661f2b88b222c1e9e00f97b48b02cde9876908a67cd98
SHA5128b96cf866dca774e5d25d7d38d1002baecc95feaeb73e16bc160d554cb47cd2992b76c91a4c962ac67eab839b76308baf777cf3e9fcc9389aa1f352ac3c900d6
-
Filesize
37KB
MD5f16dac5333fdcb27b1f2ce6d2888a884
SHA1e181f7611948f7ed40568109eb1a2d7f988ad502
SHA2562f04746f12c5fcf5381688423accfc9f1d3ff2f73b1c829a164d8591815b448c
SHA512d347caba4b5dbdccaff8ccedd91314bac8b758bb37c3d02a81fb80c2b20dece51a40b809ec6d6d33becbaa3b098c34fd0c0bd7b3e1c868c4f8943be5f3788973