Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2024, 09:17
Behavioral task
behavioral1
Sample
be3c0072baf1554386b28b0335088548.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
be3c0072baf1554386b28b0335088548.exe
Resource
win10v2004-20240226-en
General
-
Target
be3c0072baf1554386b28b0335088548.exe
-
Size
10KB
-
MD5
be3c0072baf1554386b28b0335088548
-
SHA1
425a8f16dd137439fe58952d116a3bc3aabd6a70
-
SHA256
9c5448b43eac73538c933584150e5c0c64b3baace57a6ee03b12b73e8138ce1f
-
SHA512
4796c197b24648c6b7ec0dbc670fc83930d98af3c2906bca736f6cd69a09e60e283414a8914fc5ded3c8d96c69b340fa96df1e8d077dd41f8b8c529861728569
-
SSDEEP
192:umUi2n7MGwp+Bfc4rDw6HZHBp4XxQspA32akvkSDlFeZjfvi3mcJxzl+RNDq:R27MSk6nWxQse32aDQKTizvJ+RA
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run be3c0072baf1554386b28b0335088548.exe Set value (str) \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\system = "C:\\Windows\\sys.exe" be3c0072baf1554386b28b0335088548.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3045580317-3728985860-206385570-1000\Control Panel\International\Geo\Nation be3c0072baf1554386b28b0335088548.exe -
Executes dropped EXE 1 IoCs
pid Process 1156 sys.exe -
resource yara_rule behavioral2/memory/1312-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/files/0x0007000000023223-5.dat upx behavioral2/memory/1312-8-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/1156-10-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\sys.exe be3c0072baf1554386b28b0335088548.exe File opened for modification C:\Windows\sys.exe be3c0072baf1554386b28b0335088548.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1312 be3c0072baf1554386b28b0335088548.exe 1312 be3c0072baf1554386b28b0335088548.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1156 1312 be3c0072baf1554386b28b0335088548.exe 90 PID 1312 wrote to memory of 1156 1312 be3c0072baf1554386b28b0335088548.exe 90 PID 1312 wrote to memory of 1156 1312 be3c0072baf1554386b28b0335088548.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\be3c0072baf1554386b28b0335088548.exe"C:\Users\Admin\AppData\Local\Temp\be3c0072baf1554386b28b0335088548.exe"1⤵
- Adds policy Run key to start application
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\sys.exe"C:\Windows\sys.exe"2⤵
- Executes dropped EXE
PID:1156
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD5be3c0072baf1554386b28b0335088548
SHA1425a8f16dd137439fe58952d116a3bc3aabd6a70
SHA2569c5448b43eac73538c933584150e5c0c64b3baace57a6ee03b12b73e8138ce1f
SHA5124796c197b24648c6b7ec0dbc670fc83930d98af3c2906bca736f6cd69a09e60e283414a8914fc5ded3c8d96c69b340fa96df1e8d077dd41f8b8c529861728569