Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/03/2024, 06:08
Static task
static1
Behavioral task
behavioral1
Sample
c2a491b85021a2d9e419889d2df5afff.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
c2a491b85021a2d9e419889d2df5afff.exe
Resource
win10v2004-20231215-en
General
-
Target
c2a491b85021a2d9e419889d2df5afff.exe
-
Size
33KB
-
MD5
c2a491b85021a2d9e419889d2df5afff
-
SHA1
79347a75f8dde2b15e15a30c6cddca667811f652
-
SHA256
6f922d842217c8978b668ed3a8dd618ce80fbd8a105417aca733f5824e9c0275
-
SHA512
eb4f8a7704d4e48cdf024949c6af05f21a74853aec25fb457a6bb78352b2e0003bf90f039d7d79af6b2ec74217c08e3da6c880f11105ce75edc53bf173e72efe
-
SSDEEP
384:Dw5+1h1UYii+lNppElKelRgr8I4GSFdVp8NAbifwpIgX+FW3el7xI:2+1hS7i+lbpElBqMB3+I/qWQ7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation c2a491b85021a2d9e419889d2df5afff.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation service.exe -
Executes dropped EXE 1 IoCs
pid Process 2420 service.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2096 schtasks.exe 3484 schtasks.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2856 wrote to memory of 784 2856 c2a491b85021a2d9e419889d2df5afff.exe 87 PID 2856 wrote to memory of 784 2856 c2a491b85021a2d9e419889d2df5afff.exe 87 PID 2856 wrote to memory of 784 2856 c2a491b85021a2d9e419889d2df5afff.exe 87 PID 784 wrote to memory of 2096 784 cmd.exe 89 PID 784 wrote to memory of 2096 784 cmd.exe 89 PID 784 wrote to memory of 2096 784 cmd.exe 89 PID 2420 wrote to memory of 3756 2420 service.exe 98 PID 2420 wrote to memory of 3756 2420 service.exe 98 PID 2420 wrote to memory of 3756 2420 service.exe 98 PID 3756 wrote to memory of 3484 3756 cmd.exe 100 PID 3756 wrote to memory of 3484 3756 cmd.exe 100 PID 3756 wrote to memory of 3484 3756 cmd.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2a491b85021a2d9e419889d2df5afff.exe"C:\Users\Admin\AppData\Local\Temp\c2a491b85021a2d9e419889d2df5afff.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /create /tn MyApp /tr %TEMP%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn MyApp /tr C:\Users\Admin\AppData\Local\Temp\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f3⤵
- Creates scheduled task(s)
PID:2096
-
-
-
C:\Users\Admin\AppData\Local\Temp\service.exeC:\Users\Admin\AppData\Local\Temp\service.exe1⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /create /tn MyApp /tr %TEMP%\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f2⤵
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn MyApp /tr C:\Users\Admin\AppData\Local\Temp\service.exe /st 00:00 /du 9999:59 /sc daily /ri 1 /f3⤵
- Creates scheduled task(s)
PID:3484
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD5c2a491b85021a2d9e419889d2df5afff
SHA179347a75f8dde2b15e15a30c6cddca667811f652
SHA2566f922d842217c8978b668ed3a8dd618ce80fbd8a105417aca733f5824e9c0275
SHA512eb4f8a7704d4e48cdf024949c6af05f21a74853aec25fb457a6bb78352b2e0003bf90f039d7d79af6b2ec74217c08e3da6c880f11105ce75edc53bf173e72efe