Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 09:45
Behavioral task
behavioral1
Sample
c58e5e4805af3c570c5f87886abdcd0b.exe
Resource
win7-20240221-en
General
-
Target
c58e5e4805af3c570c5f87886abdcd0b.exe
-
Size
174KB
-
MD5
c58e5e4805af3c570c5f87886abdcd0b
-
SHA1
1f1ed0befea114674ab6c197737dab114eb1932d
-
SHA256
3ad2a0e7e10cf69142b1be12a1454552c67dff0b9d21adc0bd2f21cb55203314
-
SHA512
7dab6d84fb1e3f316c1e0927203582ffcd729a29c07398567826c1c1e846e1ca79c0d84dd35834a4e62fe85c60180ac1fb9201b1a0b55904b0a406bbd3247008
-
SSDEEP
3072:DBOorECV/ovJo+X3xhMeMJnxtkqXmsVpEs5FzmWD74w85DPwfhBu4b6RIkJI:9Om/82+dwxiqXmsBFX7udPuBQIF
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation c58e5e4805af3c570c5f87886abdcd0b.exe -
resource yara_rule behavioral2/memory/4212-0-0x0000000000400000-0x0000000000478000-memory.dmp upx behavioral2/memory/4212-9-0x0000000000400000-0x0000000000478000-memory.dmp upx -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BC462E4B-C520-4CA9-B1EC-A7DD36FD6D0A} c58e5e4805af3c570c5f87886abdcd0b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{BC462E4B-C520-4CA9-B1EC-A7DD36FD6D0A}\ c58e5e4805af3c570c5f87886abdcd0b.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\KGVBOOGUIOU c58e5e4805af3c570c5f87886abdcd0b.exe File created C:\Windows\windivx.dll c58e5e4805af3c570c5f87886abdcd0b.exe File opened for modification C:\Windows\windivx.dll c58e5e4805af3c570c5f87886abdcd0b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4212 wrote to memory of 2452 4212 c58e5e4805af3c570c5f87886abdcd0b.exe 87 PID 4212 wrote to memory of 2452 4212 c58e5e4805af3c570c5f87886abdcd0b.exe 87 PID 4212 wrote to memory of 2452 4212 c58e5e4805af3c570c5f87886abdcd0b.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\c58e5e4805af3c570c5f87886abdcd0b.exe"C:\Users\Admin\AppData\Local\Temp\c58e5e4805af3c570c5f87886abdcd0b.exe"1⤵
- Checks computer location settings
- Installs/modifies Browser Helper Object
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Windows\SysWOW64\regsvr32.exe"C:\Windows\System32\regsvr32.exe" /s C:\Windows\windivx.dll2⤵PID:2452
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
214KB
MD5fa246deaf2fdcdcf98229bf7a70cc8e1
SHA17995fb78277ec06bcbfde9030b53c1b2b4648720
SHA256c2aca7dcae53db3063ce22b1a758945cefc0cda9595681f68edea0f6f0a6fd1f
SHA5126a6fd808074f5951b3e50c83a9c51e8520c5a13f0875f860151dc728cffb50cf4abaaa72182a7800d992d2f4fda46170b5981fcec9482d05815d5ba9696dab31