Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10-03-2024 14:13
Static task
static1
Behavioral task
behavioral1
Sample
becfa1dc26af3f64973e4a79631dda5d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
becfa1dc26af3f64973e4a79631dda5d.exe
Resource
win10v2004-20240226-en
General
-
Target
becfa1dc26af3f64973e4a79631dda5d.exe
-
Size
136KB
-
MD5
becfa1dc26af3f64973e4a79631dda5d
-
SHA1
a0a81b91701d088ae9b63df084247829f7627bd0
-
SHA256
e67ddca1a773f22e46f70d9e068f427ba32f1cd658c23b560c4f528bd12b2059
-
SHA512
defa949f9e33cd054f0eee307d01ee0c34ff64e91b1da6c75187aa2298c1a7f5d21b4f82e30dc84b1539a9970a52f1bcee796d2aa5148cca9a296fce49a91c5a
-
SSDEEP
3072:pEg9dCZNvCxib5JluHwsLzhhGw9Qy4pKjOVRG:pEg9dCZN6KJEQcNhGo468RG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation becfa1dc26af3f64973e4a79631dda5d.exe -
Executes dropped EXE 1 IoCs
pid Process 4024 tt.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\tt.exe becfa1dc26af3f64973e4a79631dda5d.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4568 becfa1dc26af3f64973e4a79631dda5d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4568 wrote to memory of 4024 4568 becfa1dc26af3f64973e4a79631dda5d.exe 98 PID 4568 wrote to memory of 4024 4568 becfa1dc26af3f64973e4a79631dda5d.exe 98 PID 4568 wrote to memory of 4024 4568 becfa1dc26af3f64973e4a79631dda5d.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\becfa1dc26af3f64973e4a79631dda5d.exe"C:\Users\Admin\AppData\Local\Temp\becfa1dc26af3f64973e4a79631dda5d.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4568 -
C:\Windows\tt.exe"C:\Windows\tt.exe"2⤵
- Executes dropped EXE
PID:4024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4092 --field-trial-handle=2276,i,11674642242468042059,14711253743544118298,262144 --variations-seed-version /prefetch:81⤵PID:4128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5fd46824b3d7d2b26a587b5d021cf4e00
SHA1636b542d1c5e5376ee98b7b172e9f06841b87bab
SHA25638aa381a338dbc024f0cb931fdfa81b5d6af7552ad7bcd08e67587845b481533
SHA512d26bc3db57c6b22bac9fedfb8771bb381a3768b6c1ce12c2d5749aab8999025fc18ed9deb787d20fd7d48190881428a591209623e0b4b70cccc9bd501a818918