Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 10:07
Static task
static1
Behavioral task
behavioral1
Sample
c5998cc185d88e158af0c273ff88a085.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c5998cc185d88e158af0c273ff88a085.exe
Resource
win10v2004-20240226-en
General
-
Target
c5998cc185d88e158af0c273ff88a085.exe
-
Size
101KB
-
MD5
c5998cc185d88e158af0c273ff88a085
-
SHA1
50d0025b0e71aa4430572b693c3d9b807d88431d
-
SHA256
e09292a4a117a00beebfff8320cd838260240f64458e3226945096d13577b03c
-
SHA512
3dcf91a774a8e25e090ab8f93a7d834e18ae60ef7d41f8bec10317b3a7a7f5c29d58cc08f1e2330cdd55746591d7b1b1a4a8b6dba7d24050b34e973141929864
-
SSDEEP
1536:8CHo3QHB5SQJNk2CirszQWFsOv5OPv6dxAiOeOjZqMVz9omx9:hqgJu2IzTFtv5WvAhOeeZXx9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation c5998cc185d88e158af0c273ff88a085.exe -
Executes dropped EXE 1 IoCs
pid Process 1856 c9e49641.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\f44a5533.dll c5998cc185d88e158af0c273ff88a085.exe File opened for modification C:\Windows\SysWOW64\f44a5533.dll c5998cc185d88e158af0c273ff88a085.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1856 c9e49641.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1580 wrote to memory of 1856 1580 c5998cc185d88e158af0c273ff88a085.exe 90 PID 1580 wrote to memory of 1856 1580 c5998cc185d88e158af0c273ff88a085.exe 90 PID 1580 wrote to memory of 1856 1580 c5998cc185d88e158af0c273ff88a085.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\c5998cc185d88e158af0c273ff88a085.exe"C:\Users\Admin\AppData\Local\Temp\c5998cc185d88e158af0c273ff88a085.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\c9e49641.exe"C:\Users\Admin\AppData\Local\Temp\c9e49641.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD55e3416f87fcbfbd0688addf8304d7945
SHA17b5b45e77daa33e29d110b1c8e7bef134721394e
SHA256682f376ce3b9fa8a232af4eafbbe99af90a1f82d8a4477b65345817fe531c1c1
SHA512263f0239874845e24e373edd6b1d5e40f2d10ea03f039502e2ae209ec1f94c5538aca771e8679edd614cecee1e2e973a8abfa891f0fca3b154fbb6c82fb869b6