Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 02:10
Static task
static1
Behavioral task
behavioral1
Sample
c4b4bf7d9089788bb7f19f7a8e527d4f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4b4bf7d9089788bb7f19f7a8e527d4f.exe
Resource
win10v2004-20240226-en
General
-
Target
c4b4bf7d9089788bb7f19f7a8e527d4f.exe
-
Size
3.4MB
-
MD5
c4b4bf7d9089788bb7f19f7a8e527d4f
-
SHA1
182cf7e4e5d011523a891286fab19d747f098da0
-
SHA256
ad0d8c4b22e9ae3fcb83dfc0cd8113c9013e6945924bf6aeb0e9bb6d797b43cb
-
SHA512
90443c5cdd8b4951aa6ded40acd163c4ab8beee5ea23e9ac8e9d683aea7520e4c6e00bf52ea984fa5d3e686f1aa0b7d06df3bd6880bc5511bdcaa1515eafcc26
-
SSDEEP
98304:JYy2g2eODGhQekoXmduwGrJU58o9eHmkqh+y:GgQDk2Si58o9eTqh+
Malware Config
Signatures
-
Blocklisted process makes network request 10 IoCs
flow pid Process 50 212 cmd.exe 51 212 cmd.exe 54 212 cmd.exe 75 212 cmd.exe 76 212 cmd.exe 103 212 cmd.exe 104 212 cmd.exe 155 212 cmd.exe 180 212 cmd.exe 182 212 cmd.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation c4b4bf7d9089788bb7f19f7a8e527d4f.exe Key value queried \REGISTRY\USER\S-1-5-21-399997616-3400990511-967324271-1000\Control Panel\International\Geo\Nation 6eTvYbMXEU.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6eTvYbMXEU.exe c4b4bf7d9089788bb7f19f7a8e527d4f.exe -
Executes dropped EXE 2 IoCs
pid Process 1888 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 1336 6eTvYbMXEU.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe 212 cmd.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2656 wrote to memory of 4440 2656 c4b4bf7d9089788bb7f19f7a8e527d4f.exe 87 PID 2656 wrote to memory of 4440 2656 c4b4bf7d9089788bb7f19f7a8e527d4f.exe 87 PID 2656 wrote to memory of 4440 2656 c4b4bf7d9089788bb7f19f7a8e527d4f.exe 87 PID 4440 wrote to memory of 1888 4440 c4b4bf7d9089788bb7f19f7a8e527d4f.exe 97 PID 4440 wrote to memory of 1888 4440 c4b4bf7d9089788bb7f19f7a8e527d4f.exe 97 PID 4440 wrote to memory of 1888 4440 c4b4bf7d9089788bb7f19f7a8e527d4f.exe 97 PID 1888 wrote to memory of 1336 1888 6eTvYbMXEU.exe 98 PID 1888 wrote to memory of 1336 1888 6eTvYbMXEU.exe 98 PID 1888 wrote to memory of 1336 1888 6eTvYbMXEU.exe 98 PID 1336 wrote to memory of 212 1336 6eTvYbMXEU.exe 102 PID 1336 wrote to memory of 212 1336 6eTvYbMXEU.exe 102 PID 1336 wrote to memory of 212 1336 6eTvYbMXEU.exe 102 PID 1336 wrote to memory of 212 1336 6eTvYbMXEU.exe 102 PID 1336 wrote to memory of 212 1336 6eTvYbMXEU.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4b4bf7d9089788bb7f19f7a8e527d4f.exe"C:\Users\Admin\AppData\Local\Temp\c4b4bf7d9089788bb7f19f7a8e527d4f.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\c4b4bf7d9089788bb7f19f7a8e527d4f.exe"C:\Users\Admin\AppData\Local\Temp\c4b4bf7d9089788bb7f19f7a8e527d4f.exe"2⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6eTvYbMXEU.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6eTvYbMXEU.exe" "C:\Users\Admin\AppData\Local\Temp\c4b4bf7d9089788bb7f19f7a8e527d4f.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6eTvYbMXEU.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6eTvYbMXEU.exe" "C:\Users\Admin\AppData\Local\Temp\c4b4bf7d9089788bb7f19f7a8e527d4f.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"5⤵
- Blocklisted process makes network request
- Suspicious behavior: EnumeratesProcesses
PID:212
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
462KB
MD50091efcfd3614b21c29d8ca90d2a5fc9
SHA13ed9b947e4eb83f15ff67e3f30ee18b3e6d6cc9c
SHA2568fc2fa220a96c7e4cea09b9e1afefc28cf987adfa5d232450fd54f5bb7a4c90e
SHA512239dec67fce4e1db54365220c919f105e7d57777ed9a10b2e213983daee1d577abf6498f31608b3b528f3a54704782bc36635e5057789e326e683302de0bd2b5
-
Filesize
269KB
MD572b54f11cd05fcb470f092018908a2ab
SHA1ad265a786819ed564d3c17f8da0e345df8b98007
SHA256f360310572ae10f115909113cb6edb3eeb01a279608f5bc1ea5ed10e842a3205
SHA5126a7def0070651088a0384a861baa0ee49b745f679826e06136701c02c8abc81af6b5961c9d112fc1c0e70286a7b08e77b0d6abf5d553d1722ffa76b0727d5253
-
Filesize
1.3MB
MD5da192d459dafa041938b1036eda032d3
SHA151acc7f4699dbadcd91dec36b36366d42d7a6e09
SHA256efedf3aa88bcc338634d210187f6df88b01b1d376928f0d064304492b8da1122
SHA512fc0e7f61f49f85a990ae561e9cb9570e1ce02c358a50a57a3ccd61927f12d6343519a787f7705e52b770274221b355143dbed75e183279c8c853b75516476387
-
Filesize
630KB
MD581733bdaa5b8700c79f972566803fce5
SHA133aacd6686ebc8aea211baa6da2f0a69c1aabd49
SHA256dbce2c08fd1b9c5956cb4a5f82ce7d00cf238f017291508664032787068fcb82
SHA5120d1ebd3a1dcf1f1044d7e16bee394f7087328ff673b4e2c91507ae4f1ad96274a985243113e177c4e868e2f5b37fcfea4c5d353e7c3c3eee9a955cdf87692286