Analysis
-
max time kernel
93s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
16-03-2024 01:32
Behavioral task
behavioral1
Sample
ccc54a5b79c3cc02c75eeff2f1a71e83.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ccc54a5b79c3cc02c75eeff2f1a71e83.exe
Resource
win10v2004-20231215-en
General
-
Target
ccc54a5b79c3cc02c75eeff2f1a71e83.exe
-
Size
29KB
-
MD5
ccc54a5b79c3cc02c75eeff2f1a71e83
-
SHA1
839df3453f3733f3db848b44d62089cd20411150
-
SHA256
71f6d6bfed507eae1ddaea68535dd7783a9650c8ba43aa269b69f73a7ba72e0c
-
SHA512
991f49a0fecf31ea6086907ba87816bbe9a1daf7ba6da370c9f58596b7512b5f5ee62e9aa91292a8c073ee19e4227697afdc49b391ec8c276e783feae8826133
-
SSDEEP
768:Aw5O9B8/BRaPEDiJmSH+0Q2kLpSfyWsUW7yWcE:75O9B8DaPEDiJmSHMOswE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation ccc54a5b79c3cc02c75eeff2f1a71e83.exe -
resource yara_rule behavioral2/memory/2396-0-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/2396-1-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4704-2-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4704-3-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/4704-6-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\e22GGt3f.exe ccc54a5b79c3cc02c75eeff2f1a71e83.exe File opened for modification C:\Windows\SysWOW64\e22GGt3f.exe ccc54a5b79c3cc02c75eeff2f1a71e83.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4672 4704 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2396 wrote to memory of 4704 2396 ccc54a5b79c3cc02c75eeff2f1a71e83.exe 84 PID 2396 wrote to memory of 4704 2396 ccc54a5b79c3cc02c75eeff2f1a71e83.exe 84 PID 2396 wrote to memory of 4704 2396 ccc54a5b79c3cc02c75eeff2f1a71e83.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccc54a5b79c3cc02c75eeff2f1a71e83.exe"C:\Users\Admin\AppData\Local\Temp\ccc54a5b79c3cc02c75eeff2f1a71e83.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\ccc54a5b79c3cc02c75eeff2f1a71e83.exe"C:\Users\Admin\AppData\Local\Temp\ccc54a5b79c3cc02c75eeff2f1a71e83.exe" y2⤵
- Drops file in System32 directory
PID:4704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4704 -s 4043⤵
- Program crash
PID:4672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 208 -p 4704 -ip 47041⤵PID:2624