Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 08:49
Static task
static1
Behavioral task
behavioral1
Sample
cafb65ee6617b984354d3025b87aef34.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cafb65ee6617b984354d3025b87aef34.exe
Resource
win10v2004-20240226-en
General
-
Target
cafb65ee6617b984354d3025b87aef34.exe
-
Size
136KB
-
MD5
cafb65ee6617b984354d3025b87aef34
-
SHA1
7e0954d7a3d785c322a95210a554cbf44a94eaff
-
SHA256
d459febb408cf7e62ce2aeebfdc1323544b6d178d22542a6f836b6820b2bdf40
-
SHA512
1647533c2fcdc7f3bd6fb7a9bb69a25ad43bf8dc13a71a991c8e89d764f4352a741ace22237f496c889cea2237adf46306d9822a712f82682ffb66978e554d87
-
SSDEEP
3072:IFlPHoTgWMoDJeceXqSHgt8AIPH8FJgryZSxYnEl7L3g:IFhHGZl9e6SHgG8bkYnEl7s
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\P-7-78-8964-9648-3874\wincrs.exe = "C:\\Users\\Admin\\P-7-78-8964-9648-3874\\wincrs.exe:*:Enabled:Microsoft Windows System" cafb65ee6617b984354d3025b87aef34.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List cafb65ee6617b984354d3025b87aef34.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile cafb65ee6617b984354d3025b87aef34.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications cafb65ee6617b984354d3025b87aef34.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation cafb65ee6617b984354d3025b87aef34.exe -
Executes dropped EXE 2 IoCs
pid Process 2904 wincrs.exe 3584 wincrs.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Windows System = "C:\\Users\\Admin\\P-7-78-8964-9648-3874\\wincrs.exe" cafb65ee6617b984354d3025b87aef34.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 408 set thread context of 3172 408 cafb65ee6617b984354d3025b87aef34.exe 89 PID 2904 set thread context of 3584 2904 wincrs.exe 93 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ cafb65ee6617b984354d3025b87aef34.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 408 wrote to memory of 3172 408 cafb65ee6617b984354d3025b87aef34.exe 89 PID 408 wrote to memory of 3172 408 cafb65ee6617b984354d3025b87aef34.exe 89 PID 408 wrote to memory of 3172 408 cafb65ee6617b984354d3025b87aef34.exe 89 PID 408 wrote to memory of 3172 408 cafb65ee6617b984354d3025b87aef34.exe 89 PID 408 wrote to memory of 3172 408 cafb65ee6617b984354d3025b87aef34.exe 89 PID 408 wrote to memory of 3172 408 cafb65ee6617b984354d3025b87aef34.exe 89 PID 408 wrote to memory of 3172 408 cafb65ee6617b984354d3025b87aef34.exe 89 PID 408 wrote to memory of 3172 408 cafb65ee6617b984354d3025b87aef34.exe 89 PID 408 wrote to memory of 3172 408 cafb65ee6617b984354d3025b87aef34.exe 89 PID 408 wrote to memory of 3172 408 cafb65ee6617b984354d3025b87aef34.exe 89 PID 3172 wrote to memory of 2904 3172 cafb65ee6617b984354d3025b87aef34.exe 92 PID 3172 wrote to memory of 2904 3172 cafb65ee6617b984354d3025b87aef34.exe 92 PID 3172 wrote to memory of 2904 3172 cafb65ee6617b984354d3025b87aef34.exe 92 PID 2904 wrote to memory of 3584 2904 wincrs.exe 93 PID 2904 wrote to memory of 3584 2904 wincrs.exe 93 PID 2904 wrote to memory of 3584 2904 wincrs.exe 93 PID 2904 wrote to memory of 3584 2904 wincrs.exe 93 PID 2904 wrote to memory of 3584 2904 wincrs.exe 93 PID 2904 wrote to memory of 3584 2904 wincrs.exe 93 PID 2904 wrote to memory of 3584 2904 wincrs.exe 93 PID 2904 wrote to memory of 3584 2904 wincrs.exe 93 PID 2904 wrote to memory of 3584 2904 wincrs.exe 93 PID 2904 wrote to memory of 3584 2904 wincrs.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\cafb65ee6617b984354d3025b87aef34.exe"C:\Users\Admin\AppData\Local\Temp\cafb65ee6617b984354d3025b87aef34.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Users\Admin\AppData\Local\Temp\cafb65ee6617b984354d3025b87aef34.exe"C:\Users\Admin\AppData\Local\Temp\cafb65ee6617b984354d3025b87aef34.exe"2⤵
- Modifies firewall policy service
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3172 -
C:\Users\Admin\P-7-78-8964-9648-3874\wincrs.exe"C:\Users\Admin\P-7-78-8964-9648-3874\wincrs.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\P-7-78-8964-9648-3874\wincrs.exe"C:\Users\Admin\P-7-78-8964-9648-3874\wincrs.exe"4⤵
- Executes dropped EXE
PID:3584
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
136KB
MD5cafb65ee6617b984354d3025b87aef34
SHA17e0954d7a3d785c322a95210a554cbf44a94eaff
SHA256d459febb408cf7e62ce2aeebfdc1323544b6d178d22542a6f836b6820b2bdf40
SHA5121647533c2fcdc7f3bd6fb7a9bb69a25ad43bf8dc13a71a991c8e89d764f4352a741ace22237f496c889cea2237adf46306d9822a712f82682ffb66978e554d87