Analysis
-
max time kernel
140s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 19:45
Static task
static1
Behavioral task
behavioral1
Sample
cc44bfc67c96b1216c1a2fb03a4b2aa8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cc44bfc67c96b1216c1a2fb03a4b2aa8.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
bqwvzl40.exe
Resource
win7-20240220-en
Behavioral task
behavioral4
Sample
bqwvzl40.exe
Resource
win10v2004-20240226-en
General
-
Target
cc44bfc67c96b1216c1a2fb03a4b2aa8.exe
-
Size
82KB
-
MD5
cc44bfc67c96b1216c1a2fb03a4b2aa8
-
SHA1
0a6cfdd880c3bae43b1eee5673ec80859ceec22d
-
SHA256
3e4d2943ab33ddc0ee332623962027bb68ae3a956227622428b9579f11192c94
-
SHA512
aeaa919dfdcfd26cd3aceb40b4de0ff1e66aa3101c6052371dadf21966c0632665094202be208fb644e80e9fa541d010c5f4fe38c6fe94c286408bc462f843ee
-
SSDEEP
1536:KpgpHzb9dZVX9fHMvG0D3XJlMPtBgdhKZvAznOzxqdpX7ne6rfMawjlCE:IgXdZt9P6D3XJlMPtBYpzOzx4be6zCjJ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation cc44bfc67c96b1216c1a2fb03a4b2aa8.exe -
Executes dropped EXE 2 IoCs
pid Process 3592 bqwvzl40.exe 1160 bqwvzl40.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\bqwvzl40 = "C:\\Users\\Admin\\AppData\\Roaming\\bqwvzl40.exe" cc44bfc67c96b1216c1a2fb03a4b2aa8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4408 wrote to memory of 3592 4408 cc44bfc67c96b1216c1a2fb03a4b2aa8.exe 85 PID 4408 wrote to memory of 3592 4408 cc44bfc67c96b1216c1a2fb03a4b2aa8.exe 85 PID 4408 wrote to memory of 3592 4408 cc44bfc67c96b1216c1a2fb03a4b2aa8.exe 85 PID 3592 wrote to memory of 1160 3592 bqwvzl40.exe 86 PID 3592 wrote to memory of 1160 3592 bqwvzl40.exe 86 PID 3592 wrote to memory of 1160 3592 bqwvzl40.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc44bfc67c96b1216c1a2fb03a4b2aa8.exe"C:\Users\Admin\AppData\Local\Temp\cc44bfc67c96b1216c1a2fb03a4b2aa8.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Users\Admin\AppData\Roaming\bqwvzl40.exe"C:\Users\Admin\AppData\Roaming\bqwvzl40.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Roaming\bqwvzl40.exeC:\Users\Admin\AppData\Roaming\bqwvzl40.exe --Restart3⤵
- Executes dropped EXE
PID:1160
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD50e14a49865b35f083738ed90e36bb16b
SHA197ac5f852e994e1836c5f3d78df743f4dd4e6c28
SHA2561c59a0eeca0104e735b3cd93aad92c8dbdcbba8928cad8ae66dbaa09227cce55
SHA5129376cad2ae6499d3f2335c837d9b60f9c943266b9fdff73d9e8662fe771b70de6ae5851aaaa0eb362c04c7427d3fbd3c64f82210cb7527e25c57a36a84f8e435