Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
12-03-2024 12:52
Static task
static1
Behavioral task
behavioral1
Sample
c36a3576f7812c5c39557d32584e0fa1.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c36a3576f7812c5c39557d32584e0fa1.exe
Resource
win10v2004-20240226-en
General
-
Target
c36a3576f7812c5c39557d32584e0fa1.exe
-
Size
104KB
-
MD5
c36a3576f7812c5c39557d32584e0fa1
-
SHA1
d215bc0e873295582d9450ce7ede7b3bf09b1fb1
-
SHA256
2be78e7b0782d26d73f18144941d9750ab0dbabf9cdb70d93a9513838530f7be
-
SHA512
3d73e26cba11cf560d5969c02f49fd3d4d59589c2e3ead2950d1a2fc52010aa18d9335d7c487e707e9f2030ea4746a2eaa6794ef58c670a108b410d466ab43b8
-
SSDEEP
3072:puzIQ6qjdD8Kys1M1VF45bE4GXekout1:qp6qjdD8o1qzyEh1oS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation c36a3576f7812c5c39557d32584e0fa1.exe -
Loads dropped DLL 1 IoCs
pid Process 1776 rundll32.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Wizet\Maple\npkcrypt.dll rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1776 rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3476 wrote to memory of 1776 3476 c36a3576f7812c5c39557d32584e0fa1.exe 89 PID 3476 wrote to memory of 1776 3476 c36a3576f7812c5c39557d32584e0fa1.exe 89 PID 3476 wrote to memory of 1776 3476 c36a3576f7812c5c39557d32584e0fa1.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c36a3576f7812c5c39557d32584e0fa1.exe"C:\Users\Admin\AppData\Local\Temp\c36a3576f7812c5c39557d32584e0fa1.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" "C:\Users\Admin\Favorites\hfdf.hlp" InstallHook12⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:1776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD5984784de8a6bf33ec09bc361b98577a4
SHA1de1d917ddab4cb1ce935337592a46d08cd222bb3
SHA256a2e58cf7588883540380403ef473af5e93163e3391e421a3f1e571f302c80b24
SHA512635afdff5dc8cb987f1ad2a573620b317a5279c89d0015a5c37a8bf518e1382ebaeb0cb03fa440f80750b172da2ec2f23855e8747cadde062027f514579ee817