Analysis
-
max time kernel
154s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19-03-2024 13:00
Static task
static1
Behavioral task
behavioral1
Sample
d62d82eccae9cae541c55262b4fe3a9c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d62d82eccae9cae541c55262b4fe3a9c.exe
Resource
win10v2004-20240226-en
General
-
Target
d62d82eccae9cae541c55262b4fe3a9c.exe
-
Size
251KB
-
MD5
d62d82eccae9cae541c55262b4fe3a9c
-
SHA1
9d4e8e4ea2bab28949149634c1c072b8e4686d7e
-
SHA256
37c75e9276f33dd445d4cf3b8c4a8450e014f84c317c58a1fc93835280b195e4
-
SHA512
efd27d504f00c889a141ae514d4544c9d20760faa9fa6010c3e8dd729dead716d80459ba36aa95a68e11d316869ef346a6feb22b8b5ce137dd6a0dbecd0f64f3
-
SSDEEP
6144:HRJ7FvZHQ4X/thAv0i6gd+oMNRWESkW/RxgzMk3rn:HH04vEv0gUocRfSRpx6z
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation d62d82eccae9cae541c55262b4fe3a9c.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation lsass.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\explorer.exe lsass.exe -
Executes dropped EXE 2 IoCs
pid Process 1712 lsass.exe 2084 lsass.exe -
resource yara_rule behavioral2/memory/1936-0-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/1936-2-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/1936-3-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/1936-5-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/1936-20-0x0000000000400000-0x0000000000498000-memory.dmp upx behavioral2/memory/2084-25-0x0000000000400000-0x0000000000498000-memory.dmp upx -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\4DFlowerBox.scr lsass.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4452 set thread context of 1936 4452 d62d82eccae9cae541c55262b4fe3a9c.exe 94 PID 1712 set thread context of 2084 1712 lsass.exe 98 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\lsass.exe d62d82eccae9cae541c55262b4fe3a9c.exe File opened for modification C:\Windows\lsass.exe d62d82eccae9cae541c55262b4fe3a9c.exe File opened for modification C:\Windows\lsass.exe lsass.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1936 d62d82eccae9cae541c55262b4fe3a9c.exe 2084 lsass.exe 2084 lsass.exe 2084 lsass.exe 2084 lsass.exe 2084 lsass.exe 2084 lsass.exe 2084 lsass.exe 2084 lsass.exe 2084 lsass.exe 2084 lsass.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4452 wrote to memory of 1936 4452 d62d82eccae9cae541c55262b4fe3a9c.exe 94 PID 4452 wrote to memory of 1936 4452 d62d82eccae9cae541c55262b4fe3a9c.exe 94 PID 4452 wrote to memory of 1936 4452 d62d82eccae9cae541c55262b4fe3a9c.exe 94 PID 4452 wrote to memory of 1936 4452 d62d82eccae9cae541c55262b4fe3a9c.exe 94 PID 4452 wrote to memory of 1936 4452 d62d82eccae9cae541c55262b4fe3a9c.exe 94 PID 1936 wrote to memory of 1712 1936 d62d82eccae9cae541c55262b4fe3a9c.exe 97 PID 1936 wrote to memory of 1712 1936 d62d82eccae9cae541c55262b4fe3a9c.exe 97 PID 1936 wrote to memory of 1712 1936 d62d82eccae9cae541c55262b4fe3a9c.exe 97 PID 1712 wrote to memory of 2084 1712 lsass.exe 98 PID 1712 wrote to memory of 2084 1712 lsass.exe 98 PID 1712 wrote to memory of 2084 1712 lsass.exe 98 PID 1712 wrote to memory of 2084 1712 lsass.exe 98 PID 1712 wrote to memory of 2084 1712 lsass.exe 98 PID 2084 wrote to memory of 3896 2084 lsass.exe 99 PID 2084 wrote to memory of 3896 2084 lsass.exe 99 PID 2084 wrote to memory of 3896 2084 lsass.exe 99 PID 3896 wrote to memory of 4272 3896 net.exe 101 PID 3896 wrote to memory of 4272 3896 net.exe 101 PID 3896 wrote to memory of 4272 3896 net.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\d62d82eccae9cae541c55262b4fe3a9c.exe"C:\Users\Admin\AppData\Local\Temp\d62d82eccae9cae541c55262b4fe3a9c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\d62d82eccae9cae541c55262b4fe3a9c.exeC:\Users\Admin\AppData\Local\Temp\d62d82eccae9cae541c55262b4fe3a9c.exe2⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\lsass.exe"C:\Windows\lsass.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\lsass.exeC:\Windows\lsass.exe4⤵
- Checks computer location settings
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop sharedaccess5⤵
- Suspicious use of WriteProcessMemory
PID:3896 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess6⤵PID:4272
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2180,i,12780723798465539942,12010519452607841069,262144 --variations-seed-version /prefetch:81⤵PID:5104
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
251KB
MD5d62d82eccae9cae541c55262b4fe3a9c
SHA19d4e8e4ea2bab28949149634c1c072b8e4686d7e
SHA25637c75e9276f33dd445d4cf3b8c4a8450e014f84c317c58a1fc93835280b195e4
SHA512efd27d504f00c889a141ae514d4544c9d20760faa9fa6010c3e8dd729dead716d80459ba36aa95a68e11d316869ef346a6feb22b8b5ce137dd6a0dbecd0f64f3