Analysis
-
max time kernel
150s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 07:55
Static task
static1
Behavioral task
behavioral1
Sample
c2d998718f83b47794cbd35780c72834.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c2d998718f83b47794cbd35780c72834.exe
Resource
win10v2004-20240226-en
General
-
Target
c2d998718f83b47794cbd35780c72834.exe
-
Size
48KB
-
MD5
c2d998718f83b47794cbd35780c72834
-
SHA1
bbdc400263a5b80346f6cc85919a3e0838f20f9c
-
SHA256
64185518f18098fcc63e8c207ba8ce9663adaaa6ce9515a1ee7b3ff6fced3d61
-
SHA512
33043f693e8ba584d983a6a8f0909c2dfdbc12e0e305aae73c9a4d5292abed2ec91eefe0a7cf47e36881b37df570196a29811fb1256c298e7d5bc2fca000d437
-
SSDEEP
768:EyW1yBtObv0U/xwPp0EoooiYECG2nZF5sZVcmxgs5:24Bobv7aB0EooYEC3rUVcYgw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation c2d998718f83b47794cbd35780c72834.exe -
Executes dropped EXE 1 IoCs
pid Process 1668 zbhnd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeManageVolumePrivilege 4568 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1956 wrote to memory of 1668 1956 c2d998718f83b47794cbd35780c72834.exe 97 PID 1956 wrote to memory of 1668 1956 c2d998718f83b47794cbd35780c72834.exe 97 PID 1956 wrote to memory of 1668 1956 c2d998718f83b47794cbd35780c72834.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\c2d998718f83b47794cbd35780c72834.exe"C:\Users\Admin\AppData\Local\Temp\c2d998718f83b47794cbd35780c72834.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"C:\Users\Admin\AppData\Local\Temp\zbhnd.exe"2⤵
- Executes dropped EXE
PID:1668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3996 --field-trial-handle=2240,i,16875000905773190493,11379096115878622792,262144 --variations-seed-version /prefetch:81⤵PID:60
-
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe1⤵PID:3184
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k UnistackSvcGroup1⤵
- Suspicious use of AdjustPrivilegeToken
PID:4568
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD55f89b6ca6bdc9146c92f4b961b56254c
SHA128d82675765d4e0e6eee56a0f07652a8ed47e24a
SHA256b6fc4af1c4197bc03695869ac45fd47439ce39f41e3d36be24782ae9000d0865
SHA51251525b8cde3aee226bd5f49b9596064cadfc89704c0d6e35096b84d802b1c65f608d81eafb56584b297502b2f4c9cef2a457fa500e2b5acaf64dbd305ac889a2