Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 11:42
Behavioral task
behavioral1
Sample
c8881bba97172d64a981a2b0836f9a69.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c8881bba97172d64a981a2b0836f9a69.exe
Resource
win10v2004-20240226-en
General
-
Target
c8881bba97172d64a981a2b0836f9a69.exe
-
Size
29KB
-
MD5
c8881bba97172d64a981a2b0836f9a69
-
SHA1
f38439db49558732ff7227ae7e4f66de94c88eec
-
SHA256
6b8f6c82bee78d34ad09811984c74d5fe82b4c8bf854f5d0a796e9d44efb86bb
-
SHA512
3b06a590658d859521c5205fba51e8ba1e0b08ae641b30d761e54ae71f67fdc561eb9daf4c8d0e10e111557e9967562558834ca0216fb59e266ab5e5e99f1ca3
-
SSDEEP
768:Il0K9XWkID5El01LM2m7kojZ2NnoanFG45nXcrgGWbz6aDcz:w0SGl9USAQWZ+F3lgz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-983155329-280873152-1838004294-1000\Control Panel\International\Geo\Nation c8881bba97172d64a981a2b0836f9a69.exe -
resource yara_rule behavioral2/memory/3196-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/3196-1-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4712-2-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4712-5-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\c0jdI075.exe c8881bba97172d64a981a2b0836f9a69.exe File opened for modification C:\Windows\SysWOW64\c0jdI075.exe c8881bba97172d64a981a2b0836f9a69.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3180 4712 WerFault.exe 95 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3196 wrote to memory of 4712 3196 c8881bba97172d64a981a2b0836f9a69.exe 95 PID 3196 wrote to memory of 4712 3196 c8881bba97172d64a981a2b0836f9a69.exe 95 PID 3196 wrote to memory of 4712 3196 c8881bba97172d64a981a2b0836f9a69.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c8881bba97172d64a981a2b0836f9a69.exe"C:\Users\Admin\AppData\Local\Temp\c8881bba97172d64a981a2b0836f9a69.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\c8881bba97172d64a981a2b0836f9a69.exe"C:\Users\Admin\AppData\Local\Temp\c8881bba97172d64a981a2b0836f9a69.exe" y2⤵
- Drops file in System32 directory
PID:4712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4712 -s 4163⤵
- Program crash
PID:3180
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4712 -ip 47121⤵PID:1684