Analysis
-
max time kernel
148s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 23:08
Static task
static1
Behavioral task
behavioral1
Sample
c45709d0c349e754ae8e9dd1ed10d94a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c45709d0c349e754ae8e9dd1ed10d94a.exe
Resource
win10v2004-20240226-en
General
-
Target
c45709d0c349e754ae8e9dd1ed10d94a.exe
-
Size
54KB
-
MD5
c45709d0c349e754ae8e9dd1ed10d94a
-
SHA1
65d3f0255aad3a0ac8659ed2ed85313f68de7547
-
SHA256
7bb95f4481a64807202b57aef0e11503006537e7d928b2a633661b591aca0875
-
SHA512
f0f4147bc7541dd380e60a50bada93ed902f2f3c6aeee1c6b0e198d5062f8b538afc701c5e1ac1f5901d5f92e40c5d13f3db763ab3628256bb593926277269ab
-
SSDEEP
768:Oe3PFaDVyOQgljLDKRJyM3BmsHzSB4us/wJJapg4RoSMZeUZB/4sjQtAIOqqTRPU:V3cpyORJLuB4P4AJJv4Romu/++Ek1U7
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" c45709d0c349e754ae8e9dd1ed10d94a.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation c45709d0c349e754ae8e9dd1ed10d94a.exe -
Loads dropped DLL 1 IoCs
pid Process 2640 c45709d0c349e754ae8e9dd1ed10d94a.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Internat Explorer\Desktop.ini c45709d0c349e754ae8e9dd1ed10d94a.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Microsoft\Internat Explorer\Desktop.ini c45709d0c349e754ae8e9dd1ed10d94a.exe File created C:\Program Files (x86)\Microsoft\Internat Explorer\target.lnk c45709d0c349e754ae8e9dd1ed10d94a.exe File opened for modification C:\Program Files (x86)\Microsoft\Internat Explorer attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile\shell\open c45709d0c349e754ae8e9dd1ed10d94a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.oc c45709d0c349e754ae8e9dd1ed10d94a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile\DefaultIcon c45709d0c349e754ae8e9dd1ed10d94a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile c45709d0c349e754ae8e9dd1ed10d94a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile\shell\open\command c45709d0c349e754ae8e9dd1ed10d94a.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile\shell c45709d0c349e754ae8e9dd1ed10d94a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.oc\ = "ocfile" c45709d0c349e754ae8e9dd1ed10d94a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile\DefaultIcon\ = "%1" c45709d0c349e754ae8e9dd1ed10d94a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ocfile\shell\open\command\ = "explorer \"C:\\Program Files (x86)\\Microsoft\\Internat Explorer\"" c45709d0c349e754ae8e9dd1ed10d94a.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2640 wrote to memory of 4364 2640 c45709d0c349e754ae8e9dd1ed10d94a.exe 91 PID 2640 wrote to memory of 4364 2640 c45709d0c349e754ae8e9dd1ed10d94a.exe 91 PID 2640 wrote to memory of 4364 2640 c45709d0c349e754ae8e9dd1ed10d94a.exe 91 PID 2640 wrote to memory of 4164 2640 c45709d0c349e754ae8e9dd1ed10d94a.exe 94 PID 2640 wrote to memory of 4164 2640 c45709d0c349e754ae8e9dd1ed10d94a.exe 94 PID 2640 wrote to memory of 4164 2640 c45709d0c349e754ae8e9dd1ed10d94a.exe 94 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4364 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c45709d0c349e754ae8e9dd1ed10d94a.exe"C:\Users\Admin\AppData\Local\Temp\c45709d0c349e754ae8e9dd1ed10d94a.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Checks computer location settings
- Loads dropped DLL
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\attrib.exe"C:\Windows\System32\attrib.exe" "C:\Program Files (x86)\Microsoft\Internat Explorer" +s2⤵
- Drops file in Program Files directory
- Views/modifies file attributes
PID:4364
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\temp_tmp.bat" "2⤵PID:4164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667
-
Filesize
186B
MD5c43adb1caf8346189194d6e83970aeee
SHA136c249b42b7162aac269710cdb6a5b2b28632f95
SHA25610d4ac859552819968e1da5a336bac7245e1fdf3e3a1c71eaaceb96ed5c4c132
SHA512708d89989d849d0fedbff49002f4155b58a0fd8c4ea6b4a8924b28c5c479fa3402e49f8e56d9c68bec434047d6543095710012fca573f3c5ff59af85debb2431