Analysis
-
max time kernel
142s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 14:47
Static task
static1
Behavioral task
behavioral1
Sample
bee085e0c4f557c4dc7e3b82330d12c5.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bee085e0c4f557c4dc7e3b82330d12c5.exe
Resource
win10v2004-20240226-en
General
-
Target
bee085e0c4f557c4dc7e3b82330d12c5.exe
-
Size
390KB
-
MD5
bee085e0c4f557c4dc7e3b82330d12c5
-
SHA1
5989a51f7656f176747ff51402c2e52234a8d9b6
-
SHA256
72b3420970e333b8b85395e05ddec33859fb4af13cf8c223dea462df9ea53553
-
SHA512
85c4d03e810b535b478314564e9e99af74717e451e81be7029df421741228eb2c2e1a42977f7144d1e9f91c9298d027f2694d462f7e59b745493d38106055a2e
-
SSDEEP
6144:ui16CMveKPojilIk1XRghbzkK5U+eKHXi6oltNI8IG6SSeCKif6UWef3SOfsK/Zh:u5C/jk/ufkK5UcHboFcGjUWe/nZZPJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation bee085e0c4f557c4dc7e3b82330d12c5.exe -
Executes dropped EXE 1 IoCs
pid Process 2772 pipq.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\glgqe = "\"c:\\windows\\system32\\pt-br\\pipq.exe\"" bee085e0c4f557c4dc7e3b82330d12c5.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\pt-br\pipq.exe bee085e0c4f557c4dc7e3b82330d12c5.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\0b9bf3b6.log bee085e0c4f557c4dc7e3b82330d12c5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1052 bee085e0c4f557c4dc7e3b82330d12c5.exe 1052 bee085e0c4f557c4dc7e3b82330d12c5.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1052 bee085e0c4f557c4dc7e3b82330d12c5.exe 2772 pipq.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1052 wrote to memory of 2772 1052 bee085e0c4f557c4dc7e3b82330d12c5.exe 111 PID 1052 wrote to memory of 2772 1052 bee085e0c4f557c4dc7e3b82330d12c5.exe 111 PID 1052 wrote to memory of 2772 1052 bee085e0c4f557c4dc7e3b82330d12c5.exe 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\bee085e0c4f557c4dc7e3b82330d12c5.exe"C:\Users\Admin\AppData\Local\Temp\bee085e0c4f557c4dc7e3b82330d12c5.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\windows\SysWOW64\pt-br\pipq.exe"C:\windows\system32\pt-br\pipq.exe" /i2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4124 --field-trial-handle=1928,i,13242902252791919845,10377620236057253993,262144 --variations-seed-version /prefetch:81⤵PID:4320
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96B
MD5f2b2051addb2bad589fe70f4dac90b2c
SHA12d15a0ad2a0434129e3ca0b4f71ab59da3619a93
SHA2563176199e90156a77de3d4f36b49fd7b6ed3fd76851f9e27c585020a46df840f5
SHA5120fe4ac9baead3bd74732b5cab62effdb193fbe40dd99049c26d3bc623080ebba4fe97c91278a9202c9f3dd47b4b85298ca9568d3b53fe2958b355dc8ea51cd30
-
Filesize
390KB
MD5bee085e0c4f557c4dc7e3b82330d12c5
SHA15989a51f7656f176747ff51402c2e52234a8d9b6
SHA25672b3420970e333b8b85395e05ddec33859fb4af13cf8c223dea462df9ea53553
SHA51285c4d03e810b535b478314564e9e99af74717e451e81be7029df421741228eb2c2e1a42977f7144d1e9f91c9298d027f2694d462f7e59b745493d38106055a2e