Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 07:07
Static task
static1
Behavioral task
behavioral1
Sample
c027b9793f81fbf17a3b4507f7868d38.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c027b9793f81fbf17a3b4507f7868d38.exe
Resource
win10v2004-20240226-en
General
-
Target
c027b9793f81fbf17a3b4507f7868d38.exe
-
Size
601KB
-
MD5
c027b9793f81fbf17a3b4507f7868d38
-
SHA1
bad579070ccc4b1ddfbe3377060704d49e82edaa
-
SHA256
a5ef4d55c96aca6699873bba5d26645f4e3270ab2122ef8929a443cfb34a5a45
-
SHA512
8c9b8f38d66c6c80be93161b596e320f44c3838a9b3f1764d5e39b61cd3b2572237996766a92b875644e552da33b5ea6e956abce4ac125a8f62d1f1895dd2afd
-
SSDEEP
6144:QA/TB+zbqp9lSxjEuWMTom9A/TB+zO3Cpn1bsAS0wvYlESM3kBukYYezRtuSJ13w:fUHnWMoUySA7Rv0gohYYeltuE3st
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation c027b9793f81fbf17a3b4507f7868d38.exe -
Executes dropped EXE 2 IoCs
pid Process 1076 biemn0bveNa1XvaxsUo9.exe 2996 vHvj3WAsY1mcPFeThCaG.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Media Center = "C:\\Windows\\smss.exe" biemn0bveNa1XvaxsUo9.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\smss.exe biemn0bveNa1XvaxsUo9.exe File opened for modification C:\Windows\smss.exe biemn0bveNa1XvaxsUo9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2996 vHvj3WAsY1mcPFeThCaG.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3396 wrote to memory of 1076 3396 c027b9793f81fbf17a3b4507f7868d38.exe 101 PID 3396 wrote to memory of 1076 3396 c027b9793f81fbf17a3b4507f7868d38.exe 101 PID 3396 wrote to memory of 1076 3396 c027b9793f81fbf17a3b4507f7868d38.exe 101 PID 3396 wrote to memory of 2996 3396 c027b9793f81fbf17a3b4507f7868d38.exe 102 PID 3396 wrote to memory of 2996 3396 c027b9793f81fbf17a3b4507f7868d38.exe 102 PID 3396 wrote to memory of 2996 3396 c027b9793f81fbf17a3b4507f7868d38.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\c027b9793f81fbf17a3b4507f7868d38.exe"C:\Users\Admin\AppData\Local\Temp\c027b9793f81fbf17a3b4507f7868d38.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\biemn0bveNa1XvaxsUo9.exe"C:\Users\Admin\AppData\Local\Temp\biemn0bveNa1XvaxsUo9.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
PID:1076
-
-
C:\Users\Admin\AppData\Local\Temp\vHvj3WAsY1mcPFeThCaG.exe"C:\Users\Admin\AppData\Local\Temp\vHvj3WAsY1mcPFeThCaG.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2996
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4136 --field-trial-handle=2744,i,16362475727591565961,3676688664819797550,262144 --variations-seed-version /prefetch:81⤵PID:3708
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5b4c3111a9cc347bea4b1df5b81d4af80
SHA171238d3876926fa3344479c16d21d414d8823738
SHA256deb425cee197f3632514061b77d824b4ed818e0b1da013f4ddf72e4cbe3b648e
SHA512a804fa2fdefb0dce77dda4c94f319de94f408219f8d176cc14e2a75de979f19d35e3c041528d92a16a195554376956c760987cf6824ed7177169ce9914ddaa20
-
Filesize
312KB
MD5f10bc6dd9b82bf380fedb0c121f1465e
SHA1c09b22968a94ee6efca01373e92bbdde949902cf
SHA2569d9a7dc08d063455e344502cdb2e67b8f9ef9e40e769da14706db4937c8bdf13
SHA512ea12b73d61c46d0c33af4c0e38acfb59a219dff2eddd5ebe5dc19c06f666108559005360de058b2b0208b149e970e265ad827683544094f77279f75153358e1c