Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
7b3aeb62e157caa715e199777211d048.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
7b3aeb62e157caa715e199777211d048.exe
Resource
win10v2004-20240226-en
General
-
Target
7b3aeb62e157caa715e199777211d048.exe
-
Size
387KB
-
MD5
7b3aeb62e157caa715e199777211d048
-
SHA1
25c4a48ca0096460eb1cdeaf142f0fa60795f16a
-
SHA256
22ce96622700e71bf75433a0013bc1e1836f4879351c37c2e4482bf9b45659dd
-
SHA512
f2a8578aead35e33c171b43a2dc5cd1e2d16d207230764f295f0ba5d0290f7e4843e55c3af92c6432460ce0b6b3bcf1b403dca59bae53544f4da07a8d408c731
-
SSDEEP
12288:BqYXje0DF9k64/QSywqP0T8oIN1AHDFhY25fC2WF9s/204P:BqYDF9k64/Q9j28okAHDHY25fC2WF9sw
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\Control Panel\International\Geo\Nation rundll32.exe -
Executes dropped EXE 1 IoCs
pid Process 2008 StikyNote.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3270530367-132075249-2153716227-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\RESTART_STICKY_NOTESS = "C:\\Users\\Admin\\AppData\\Local\\Temp\\StikyNote.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2008 set thread context of 1708 2008 StikyNote.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 3468 reg.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1528 7b3aeb62e157caa715e199777211d048.exe 1528 7b3aeb62e157caa715e199777211d048.exe 2008 StikyNote.exe 2008 StikyNote.exe 1708 iexplore.exe 1708 iexplore.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 1528 wrote to memory of 3724 1528 7b3aeb62e157caa715e199777211d048.exe 98 PID 1528 wrote to memory of 3724 1528 7b3aeb62e157caa715e199777211d048.exe 98 PID 1528 wrote to memory of 3724 1528 7b3aeb62e157caa715e199777211d048.exe 98 PID 1528 wrote to memory of 3724 1528 7b3aeb62e157caa715e199777211d048.exe 98 PID 1528 wrote to memory of 3724 1528 7b3aeb62e157caa715e199777211d048.exe 98 PID 1528 wrote to memory of 2724 1528 7b3aeb62e157caa715e199777211d048.exe 99 PID 1528 wrote to memory of 2724 1528 7b3aeb62e157caa715e199777211d048.exe 99 PID 1528 wrote to memory of 2724 1528 7b3aeb62e157caa715e199777211d048.exe 99 PID 1528 wrote to memory of 2008 1528 7b3aeb62e157caa715e199777211d048.exe 101 PID 1528 wrote to memory of 2008 1528 7b3aeb62e157caa715e199777211d048.exe 101 PID 1528 wrote to memory of 2008 1528 7b3aeb62e157caa715e199777211d048.exe 101 PID 2008 wrote to memory of 1708 2008 StikyNote.exe 105 PID 2008 wrote to memory of 1708 2008 StikyNote.exe 105 PID 2008 wrote to memory of 1708 2008 StikyNote.exe 105 PID 2008 wrote to memory of 1708 2008 StikyNote.exe 105 PID 2008 wrote to memory of 1708 2008 StikyNote.exe 105 PID 2008 wrote to memory of 1708 2008 StikyNote.exe 105 PID 2008 wrote to memory of 1708 2008 StikyNote.exe 105 PID 2008 wrote to memory of 1708 2008 StikyNote.exe 105 PID 2008 wrote to memory of 1708 2008 StikyNote.exe 105 PID 2008 wrote to memory of 1708 2008 StikyNote.exe 105 PID 3724 wrote to memory of 3328 3724 rundll32.exe 113 PID 3724 wrote to memory of 3328 3724 rundll32.exe 113 PID 3724 wrote to memory of 3328 3724 rundll32.exe 113 PID 3328 wrote to memory of 3468 3328 cmd.exe 115 PID 3328 wrote to memory of 3468 3328 cmd.exe 115 PID 3328 wrote to memory of 3468 3328 cmd.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b3aeb62e157caa715e199777211d048.exe"C:\Users\Admin\AppData\Local\Temp\7b3aeb62e157caa715e199777211d048.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\reg.exeREG ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v RESTART_STICKY_NOTESS /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"4⤵
- Adds Run key to start application
- Modifies registry key
PID:3468
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c copy "C:\Users\Admin\AppData\Local\Temp\7b3aeb62e157caa715e199777211d048.exe" "C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"2⤵PID:2724
-
-
C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"C:\Users\Admin\AppData\Local\Temp\StikyNote.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD50c6907695b548b08e21cf411205541b5
SHA1fe3f8b4b07307d9589d1531b884ba2ec3aa3255d
SHA2560fc0d96dc2c40db4721251f9b86c671abbccc9f7fb2e86d84a531a2e1d2e71bf
SHA5127e77c0e0d371f7283e836dc839cf045b39640a06eff2d5676242ed2721db3587b1356c95fef4d61ca2f7ffa132924c181c0b65c420d13aa1aac352f600299b2f
-
Filesize
387KB
MD57b3aeb62e157caa715e199777211d048
SHA125c4a48ca0096460eb1cdeaf142f0fa60795f16a
SHA25622ce96622700e71bf75433a0013bc1e1836f4879351c37c2e4482bf9b45659dd
SHA512f2a8578aead35e33c171b43a2dc5cd1e2d16d207230764f295f0ba5d0290f7e4843e55c3af92c6432460ce0b6b3bcf1b403dca59bae53544f4da07a8d408c731
-
Filesize
387KB
MD5b50332c79ddec1e8b9417be936a20c81
SHA1430cef0e1cd303f2491c21c95d80ccfda6041e41
SHA2568c0a3d908c53e2a27147c4494e8807353f0ba17b191dde9cadc0b928d8503d8f
SHA512342fb8104703c3bf806b650a5b000b2953555328c0bcf37a404f7af2b9f9b17f2be5dec273b295629d5613d215e23a2896c2cbf455004f83fb0803ba73c56714
-
Filesize
47B
MD572a392628d7f368bb9bc9689a694f55a
SHA1feacee9c66028a333446f2c968bcb3d567a4033d
SHA256afa60141aee93d7e3f3d8d296e36de9956f588a6cad99f8e79ce36ab88e828dd
SHA51276f40be7d3e0de960c7bc199fd094c64588841e5b6a1b99bd7fd2e3b53f9e381ded992ee6d67848dd4fda755416792ff6e29bf0acf1a348796dcf7e9bf96229e