Analysis
-
max time kernel
133s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25/03/2024, 16:44
Static task
static1
Behavioral task
behavioral1
Sample
de78138c46614149ec6bf3e62955ac08.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de78138c46614149ec6bf3e62955ac08.exe
Resource
win10v2004-20240226-en
General
-
Target
de78138c46614149ec6bf3e62955ac08.exe
-
Size
32KB
-
MD5
de78138c46614149ec6bf3e62955ac08
-
SHA1
a02a68592c6a5e460a5be6d264e86b9f7d40ba6b
-
SHA256
bf24c542ec6b0a89224ba804f2ac74528f7cb54a278eefdf10d12eade5df365e
-
SHA512
2393cdfe4f290dfd38559582372af0e0a08833b0b21db70202c71644b74fbd40b01b68e0e2abdb1dd8d95368ee0f01810644821d174b0976ce78838a2aee9a31
-
SSDEEP
768:p5M23T7qqXTj8uMBFCV5nL8B/mT50bCialV5uWz1FSxoXEUaPUc:p+2qiTjTMBQFL8R8+Ru1x4e0pj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation de78138c46614149ec6bf3e62955ac08.exe -
Executes dropped EXE 1 IoCs
pid Process 4596 rootkit.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\rootkit.exe de78138c46614149ec6bf3e62955ac08.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4936 wrote to memory of 4596 4936 de78138c46614149ec6bf3e62955ac08.exe 90 PID 4936 wrote to memory of 4596 4936 de78138c46614149ec6bf3e62955ac08.exe 90 PID 4936 wrote to memory of 4596 4936 de78138c46614149ec6bf3e62955ac08.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\de78138c46614149ec6bf3e62955ac08.exe"C:\Users\Admin\AppData\Local\Temp\de78138c46614149ec6bf3e62955ac08.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\rootkit.exe"C:\Windows\rootkit.exe"2⤵
- Executes dropped EXE
PID:4596
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5de78138c46614149ec6bf3e62955ac08
SHA1a02a68592c6a5e460a5be6d264e86b9f7d40ba6b
SHA256bf24c542ec6b0a89224ba804f2ac74528f7cb54a278eefdf10d12eade5df365e
SHA5122393cdfe4f290dfd38559582372af0e0a08833b0b21db70202c71644b74fbd40b01b68e0e2abdb1dd8d95368ee0f01810644821d174b0976ce78838a2aee9a31