Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
11/03/2024, 19:42
Static task
static1
Behavioral task
behavioral1
Sample
c16feb5f93cb86e3e05a9ec1062f8957.exe
Resource
win7-20240221-en
General
-
Target
c16feb5f93cb86e3e05a9ec1062f8957.exe
-
Size
101KB
-
MD5
c16feb5f93cb86e3e05a9ec1062f8957
-
SHA1
c05b238ffeccf01f81cf8c2ffd4ac5ea235c2688
-
SHA256
6917063ec57111b283999c479210acef85cdb512bafbc82384207a438f1d47f7
-
SHA512
30efe361eb2bf7f1cd0971c1322c4953cb1fc44fd9bc41529d4b4d76e3266f7b097882871511bfa32f1a029e57493d8cdc11552a45e3370ff8a451dc3be24ca8
-
SSDEEP
1536:lYZEFYv0ryeR+579GHpjpJFBfAmUdCpOdUrckgjeY1K6b3DcjIUyMoR1br7F1WGs:lYZEF9yeR+F9GadddUrckgje2woW3As
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation c16feb5f93cb86e3e05a9ec1062f8957.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects c16feb5f93cb86e3e05a9ec1062f8957.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{E7A4C0C8-2BFF-4241-9E8C-92E10245EC28} c16feb5f93cb86e3e05a9ec1062f8957.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\conf.dat c16feb5f93cb86e3e05a9ec1062f8957.exe File created C:\Windows\SysWOW64\simcard1.dll c16feb5f93cb86e3e05a9ec1062f8957.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Enable Browser Extensions = "yes" c16feb5f93cb86e3e05a9ec1062f8957.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E7A4C0C8-2BFF-4241-9E8C-92E10245EC28}\InprocServer32 c16feb5f93cb86e3e05a9ec1062f8957.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E7A4C0C8-2BFF-4241-9E8C-92E10245EC28}\InprocServer32\ = "simcard1.dll" c16feb5f93cb86e3e05a9ec1062f8957.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E7A4C0C8-2BFF-4241-9E8C-92E10245EC28}\InprocServer32\ThreadingModel = "Apartment" c16feb5f93cb86e3e05a9ec1062f8957.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E7A4C0C8-2BFF-4241-9E8C-92E10245EC28}\ProgID\ = "RITLAB.1" c16feb5f93cb86e3e05a9ec1062f8957.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E7A4C0C8-2BFF-4241-9E8C-92E10245EC28}\TypeLib c16feb5f93cb86e3e05a9ec1062f8957.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E7A4C0C8-2BFF-4241-9E8C-92E10245EC28}\TypeLib\ = "{719CF1C3-AAA2-4a26-AD91-4F7894FD3D10}" c16feb5f93cb86e3e05a9ec1062f8957.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E7A4C0C8-2BFF-4241-9E8C-92E10245EC28} c16feb5f93cb86e3e05a9ec1062f8957.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E7A4C0C8-2BFF-4241-9E8C-92E10245EC28}\ = "Flash Module" c16feb5f93cb86e3e05a9ec1062f8957.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{E7A4C0C8-2BFF-4241-9E8C-92E10245EC28}\ProgID c16feb5f93cb86e3e05a9ec1062f8957.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4404 wrote to memory of 3520 4404 c16feb5f93cb86e3e05a9ec1062f8957.exe 89 PID 4404 wrote to memory of 3520 4404 c16feb5f93cb86e3e05a9ec1062f8957.exe 89 PID 4404 wrote to memory of 3520 4404 c16feb5f93cb86e3e05a9ec1062f8957.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c16feb5f93cb86e3e05a9ec1062f8957.exe"C:\Users\Admin\AppData\Local\Temp\c16feb5f93cb86e3e05a9ec1062f8957.exe"1⤵
- Checks computer location settings
- Installs/modifies Browser Helper Object
- Drops file in System32 directory
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\C16FEB~1.EXE >> NUL2⤵PID:3520
-