Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13-03-2024 01:42
Static task
static1
Behavioral task
behavioral1
Sample
c4a6a667d280bf58172d70b5cc2ab283.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4a6a667d280bf58172d70b5cc2ab283.exe
Resource
win10v2004-20240226-en
General
-
Target
c4a6a667d280bf58172d70b5cc2ab283.exe
-
Size
104KB
-
MD5
c4a6a667d280bf58172d70b5cc2ab283
-
SHA1
591be136c30f6141ca137fb5259fc0d1e1e8c956
-
SHA256
6fdf71cc2e23c89add7da89bd3960d20f65ab166d5d3facdb739bde5950d3df2
-
SHA512
2e2dc85a4c4e6a61a1d666d23d1aec9244725e83a25d960fc641acf65e8ce2e51402791bc2af74c697472b1a3f852e371a0a4de955013d04dc90c3d04355705b
-
SSDEEP
1536:S6HGhwSsky22UJ826eeJo5FRfW5RWTiXJ3j++PObZJTA5:S6HGhGkckeJoFfYWTiXJ3i+AZJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation c4a6a667d280bf58172d70b5cc2ab283.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation cyavznuc.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation cyavznuc.exe -
Deletes itself 1 IoCs
pid Process 3548 cyavznuc.exe -
Executes dropped EXE 2 IoCs
pid Process 3548 cyavznuc.exe 1488 cyavznuc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\cyavznuc.exe c4a6a667d280bf58172d70b5cc2ab283.exe File opened for modification \??\c:\windows\SysWOW64\cyavznuc.exe c4a6a667d280bf58172d70b5cc2ab283.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000000-0000-0000-0000-000000000001} c4a6a667d280bf58172d70b5cc2ab283.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000000-0000-0000-0000-000000000001}\InprocServer32 cyavznuc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000000-0000-0000-0000-000000000001}\InprocServer32 cyavznuc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{00000000-0000-0000-0000-000000000001}\InprocServer32 c4a6a667d280bf58172d70b5cc2ab283.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node c4a6a667d280bf58172d70b5cc2ab283.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID c4a6a667d280bf58172d70b5cc2ab283.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4364 wrote to memory of 1020 4364 c4a6a667d280bf58172d70b5cc2ab283.exe 88 PID 4364 wrote to memory of 1020 4364 c4a6a667d280bf58172d70b5cc2ab283.exe 88 PID 4364 wrote to memory of 1020 4364 c4a6a667d280bf58172d70b5cc2ab283.exe 88 PID 4364 wrote to memory of 3548 4364 c4a6a667d280bf58172d70b5cc2ab283.exe 89 PID 4364 wrote to memory of 3548 4364 c4a6a667d280bf58172d70b5cc2ab283.exe 89 PID 4364 wrote to memory of 3548 4364 c4a6a667d280bf58172d70b5cc2ab283.exe 89 PID 3548 wrote to memory of 404 3548 cyavznuc.exe 90 PID 3548 wrote to memory of 404 3548 cyavznuc.exe 90 PID 3548 wrote to memory of 404 3548 cyavznuc.exe 90 PID 3548 wrote to memory of 1488 3548 cyavznuc.exe 91 PID 3548 wrote to memory of 1488 3548 cyavznuc.exe 91 PID 3548 wrote to memory of 1488 3548 cyavznuc.exe 91 PID 1488 wrote to memory of 4688 1488 cyavznuc.exe 92 PID 1488 wrote to memory of 4688 1488 cyavznuc.exe 92 PID 1488 wrote to memory of 4688 1488 cyavznuc.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4a6a667d280bf58172d70b5cc2ab283.exe"C:\Users\Admin\AppData\Local\Temp\c4a6a667d280bf58172d70b5cc2ab283.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4364 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s2⤵PID:1020
-
-
C:\windows\SysWOW64\cyavznuc.exe"C:\windows\system32\cyavznuc.exe" -kill c:\users\admin\appdata\local\temp\c4a6a667d280bf58172d70b5cc2ab283.exe /install2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s3⤵PID:404
-
-
C:\windows\SysWOW64\cyavznuc.exe"C:\windows\system32\cyavznuc.exe" -kill c:\windows\syswow64\cyavznuc.exe /install /install3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\system32\regsvr32.exe" C:\Windows\system32\SafeSearch.dll /u /s4⤵PID:4688
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
104KB
MD5c4a6a667d280bf58172d70b5cc2ab283
SHA1591be136c30f6141ca137fb5259fc0d1e1e8c956
SHA2566fdf71cc2e23c89add7da89bd3960d20f65ab166d5d3facdb739bde5950d3df2
SHA5122e2dc85a4c4e6a61a1d666d23d1aec9244725e83a25d960fc641acf65e8ce2e51402791bc2af74c697472b1a3f852e371a0a4de955013d04dc90c3d04355705b