Analysis
-
max time kernel
140s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
cb96f4b88cc56af60b6cfef38075e032.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cb96f4b88cc56af60b6cfef38075e032.exe
Resource
win10v2004-20240226-en
General
-
Target
cb96f4b88cc56af60b6cfef38075e032.exe
-
Size
1.8MB
-
MD5
cb96f4b88cc56af60b6cfef38075e032
-
SHA1
a15276ac8a89a07e2639830a929708ec9d5cc5be
-
SHA256
5f966f19c143f27e90d08513ca56f8e10f40ff762779835aced1b3d28984501b
-
SHA512
87144b929c35dd1619ee85f7dfe3ba79123415d2392f9807d1e47ebc7e0cece5e1aed026c8ee86df438cd7c7d4ad740aaf7f561f5bd2172d4ed0e87081560b8a
-
SSDEEP
49152:m+fm1tJMBMCo+M7VnDIa8Tjc04axAwCQsm6pW:mnI+z54TN3tfsm6pW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation cb96f4b88cc56af60b6cfef38075e032.exe -
Executes dropped EXE 1 IoCs
pid Process 3180 Protector-whxf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2800 cb96f4b88cc56af60b6cfef38075e032.exe Token: SeShutdownPrivilege 2800 cb96f4b88cc56af60b6cfef38075e032.exe Token: SeDebugPrivilege 3180 Protector-whxf.exe Token: SeShutdownPrivilege 3180 Protector-whxf.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2800 cb96f4b88cc56af60b6cfef38075e032.exe 3180 Protector-whxf.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2800 wrote to memory of 3180 2800 cb96f4b88cc56af60b6cfef38075e032.exe 100 PID 2800 wrote to memory of 3180 2800 cb96f4b88cc56af60b6cfef38075e032.exe 100 PID 2800 wrote to memory of 3180 2800 cb96f4b88cc56af60b6cfef38075e032.exe 100 PID 2800 wrote to memory of 964 2800 cb96f4b88cc56af60b6cfef38075e032.exe 102 PID 2800 wrote to memory of 964 2800 cb96f4b88cc56af60b6cfef38075e032.exe 102 PID 2800 wrote to memory of 964 2800 cb96f4b88cc56af60b6cfef38075e032.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb96f4b88cc56af60b6cfef38075e032.exe"C:\Users\Admin\AppData\Local\Temp\cb96f4b88cc56af60b6cfef38075e032.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Roaming\Protector-whxf.exeC:\Users\Admin\AppData\Roaming\Protector-whxf.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3180
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\CB96F4~1.EXE" >> NUL2⤵PID:964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4068 --field-trial-handle=2236,i,5367110156796017614,12594004256180761011,262144 --variations-seed-version /prefetch:81⤵PID:1904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD504e910683f77386f8d05be7457e3df9f
SHA1917307c6b011716ff8991f2dc81696b7588197ff
SHA256efca4e2a03e5e685740624207c269597a83ceb7a090eed6adcefb3b864125d04
SHA51227f61db2e745582b48deeff4090ef79e83805305eaf8f18b97ddbe2812bd6949c46ea815afeac95fa3a49c8f351f813d3d1d9ab1bcbcfe2b13bddb36bfe3945c
-
Filesize
723KB
MD57d40955ecb5bade6868ae85586894837
SHA1517923ee5d3722584a6612e3ae889e9bbac37759
SHA256f25994e9ddc92959646f8b6c5d6fe4d4eb0fef492f2e2dd0ce724e9d716cdebe
SHA5123f103631ac84e67762f308212149aee4afd67f5474fb180e36f14747baa9bdfae4754785ed041b799ca9bf53b2b1ac10701553e44d07c30c5aa8db5d8e660a29