Analysis
-
max time kernel
151s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
26-03-2024 15:43
Static task
static1
Behavioral task
behavioral1
Sample
df859feda2e7af11ce9b81ecb9090691.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
df859feda2e7af11ce9b81ecb9090691.exe
Resource
win10v2004-20240226-en
General
-
Target
df859feda2e7af11ce9b81ecb9090691.exe
-
Size
61KB
-
MD5
df859feda2e7af11ce9b81ecb9090691
-
SHA1
2cca84df83856523c36b8da73e5bac5bd147771d
-
SHA256
60cba11aef72dd5f445f90673fafe42c748f8cce0770ea6dad0c57611986b61c
-
SHA512
01abb312363d01ef4d1336fcc0b33dee8fb22e5610be4fd4e0d8e2b4045785ca7ffc545721d1989394cea13716530d08105734a09d1a1bcfce4be5b110ae986d
-
SSDEEP
1536:pA2yIzeIHTgI0Tv8Q5VnVQ2broOpgpi6FBej:uIzsITQ5VuKrnoFgj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation df859feda2e7af11ce9b81ecb9090691.exe Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation systems.exe -
Executes dropped EXE 2 IoCs
pid Process 3028 systems.exe 4420 systems.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Windows\\systems.exe" df859feda2e7af11ce9b81ecb9090691.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Windows\\systems.exe" systems.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2752 set thread context of 4912 2752 df859feda2e7af11ce9b81ecb9090691.exe 96 PID 3028 set thread context of 4420 3028 systems.exe 100 -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\noruns.reg df859feda2e7af11ce9b81ecb9090691.exe File opened for modification C:\Windows\systems.exe df859feda2e7af11ce9b81ecb9090691.exe File created C:\Windows\systems.exe df859feda2e7af11ce9b81ecb9090691.exe File opened for modification C:\Windows\noruns.reg systems.exe File opened for modification C:\Windows\systems.exe systems.exe File created C:\Windows\systems.exe systems.exe File created C:\Windows\noruns.reg df859feda2e7af11ce9b81ecb9090691.exe -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 3988 sc.exe 3100 sc.exe 3800 sc.exe 3664 sc.exe 4924 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs .reg file with regedit 1 IoCs
pid Process 5068 regedit.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4912 df859feda2e7af11ce9b81ecb9090691.exe 4912 df859feda2e7af11ce9b81ecb9090691.exe 4912 df859feda2e7af11ce9b81ecb9090691.exe 4912 df859feda2e7af11ce9b81ecb9090691.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe 4420 systems.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2752 wrote to memory of 4912 2752 df859feda2e7af11ce9b81ecb9090691.exe 96 PID 2752 wrote to memory of 4912 2752 df859feda2e7af11ce9b81ecb9090691.exe 96 PID 2752 wrote to memory of 4912 2752 df859feda2e7af11ce9b81ecb9090691.exe 96 PID 2752 wrote to memory of 4912 2752 df859feda2e7af11ce9b81ecb9090691.exe 96 PID 2752 wrote to memory of 4912 2752 df859feda2e7af11ce9b81ecb9090691.exe 96 PID 4912 wrote to memory of 3028 4912 df859feda2e7af11ce9b81ecb9090691.exe 99 PID 4912 wrote to memory of 3028 4912 df859feda2e7af11ce9b81ecb9090691.exe 99 PID 4912 wrote to memory of 3028 4912 df859feda2e7af11ce9b81ecb9090691.exe 99 PID 3028 wrote to memory of 4420 3028 systems.exe 100 PID 3028 wrote to memory of 4420 3028 systems.exe 100 PID 3028 wrote to memory of 4420 3028 systems.exe 100 PID 3028 wrote to memory of 4420 3028 systems.exe 100 PID 3028 wrote to memory of 4420 3028 systems.exe 100 PID 4420 wrote to memory of 5068 4420 systems.exe 101 PID 4420 wrote to memory of 5068 4420 systems.exe 101 PID 4420 wrote to memory of 5068 4420 systems.exe 101 PID 4420 wrote to memory of 2352 4420 systems.exe 102 PID 4420 wrote to memory of 2352 4420 systems.exe 102 PID 4420 wrote to memory of 2352 4420 systems.exe 102 PID 4420 wrote to memory of 3624 4420 systems.exe 103 PID 4420 wrote to memory of 3624 4420 systems.exe 103 PID 4420 wrote to memory of 3624 4420 systems.exe 103 PID 4420 wrote to memory of 3988 4420 systems.exe 106 PID 4420 wrote to memory of 3988 4420 systems.exe 106 PID 4420 wrote to memory of 3988 4420 systems.exe 106 PID 4420 wrote to memory of 4520 4420 systems.exe 107 PID 4420 wrote to memory of 4520 4420 systems.exe 107 PID 4420 wrote to memory of 4520 4420 systems.exe 107 PID 4420 wrote to memory of 3100 4420 systems.exe 109 PID 4420 wrote to memory of 3100 4420 systems.exe 109 PID 4420 wrote to memory of 3100 4420 systems.exe 109 PID 4420 wrote to memory of 3260 4420 systems.exe 112 PID 4420 wrote to memory of 3260 4420 systems.exe 112 PID 4420 wrote to memory of 3260 4420 systems.exe 112 PID 2352 wrote to memory of 4472 2352 net.exe 113 PID 2352 wrote to memory of 4472 2352 net.exe 113 PID 2352 wrote to memory of 4472 2352 net.exe 113 PID 4420 wrote to memory of 3800 4420 systems.exe 114 PID 4420 wrote to memory of 3800 4420 systems.exe 114 PID 4420 wrote to memory of 3800 4420 systems.exe 114 PID 3624 wrote to memory of 3464 3624 net.exe 116 PID 3624 wrote to memory of 3464 3624 net.exe 116 PID 3624 wrote to memory of 3464 3624 net.exe 116 PID 4420 wrote to memory of 3664 4420 systems.exe 117 PID 4420 wrote to memory of 3664 4420 systems.exe 117 PID 4420 wrote to memory of 3664 4420 systems.exe 117 PID 4420 wrote to memory of 3740 4420 systems.exe 118 PID 4420 wrote to memory of 3740 4420 systems.exe 118 PID 4420 wrote to memory of 3740 4420 systems.exe 118 PID 4420 wrote to memory of 4924 4420 systems.exe 121 PID 4420 wrote to memory of 4924 4420 systems.exe 121 PID 4420 wrote to memory of 4924 4420 systems.exe 121 PID 4420 wrote to memory of 5048 4420 systems.exe 124 PID 4420 wrote to memory of 5048 4420 systems.exe 124 PID 4420 wrote to memory of 5048 4420 systems.exe 124 PID 4520 wrote to memory of 2296 4520 net.exe 126 PID 4520 wrote to memory of 2296 4520 net.exe 126 PID 4520 wrote to memory of 2296 4520 net.exe 126 PID 3260 wrote to memory of 4684 3260 net.exe 127 PID 3260 wrote to memory of 4684 3260 net.exe 127 PID 3260 wrote to memory of 4684 3260 net.exe 127 PID 3740 wrote to memory of 3376 3740 net.exe 128 PID 3740 wrote to memory of 3376 3740 net.exe 128 PID 3740 wrote to memory of 3376 3740 net.exe 128
Processes
-
C:\Users\Admin\AppData\Local\Temp\df859feda2e7af11ce9b81ecb9090691.exe"C:\Users\Admin\AppData\Local\Temp\df859feda2e7af11ce9b81ecb9090691.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\df859feda2e7af11ce9b81ecb9090691.exeC:\Users\Admin\AppData\Local\Temp\df859feda2e7af11ce9b81ecb9090691.exe2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\systems.exe"C:\Windows\systems.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\systems.exeC:\Windows\systems.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Windows\SysWOW64\regedit.exe"C:\Windows\System32\regedit.exe" /s C:\Windows\noruns.reg5⤵
- Runs .reg file with regedit
PID:5068
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop sharedaccess5⤵
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop sharedaccess6⤵PID:4472
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop KVWSC5⤵
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KVWSC6⤵PID:3464
-
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config KVWSC start= disabled5⤵
- Launches sc.exe
PID:3988
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop KVSrvXP5⤵
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop KVSrvXP6⤵PID:2296
-
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config KVSrvXP start= disabled5⤵
- Launches sc.exe
PID:3100
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop kavsvc5⤵
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop kavsvc6⤵PID:4684
-
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config kavsvc start= disabled5⤵
- Launches sc.exe
PID:3800
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config RsRavMon start= disabled5⤵
- Launches sc.exe
PID:3664
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop RsCCenter5⤵
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RsCCenter6⤵PID:3376
-
-
-
C:\Windows\SysWOW64\sc.exe"C:\Windows\System32\sc.exe" config RsCCenter start= disabled5⤵
- Launches sc.exe
PID:4924
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop RsRavMon5⤵PID:5048
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RsRavMon6⤵PID:3192
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3096 --field-trial-handle=2284,i,15722001240173834669,15048020084704567542,262144 --variations-seed-version /prefetch:81⤵PID:808
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
122B
MD5704f9f14e6c5b902de15f37bbb234bbc
SHA14e7bd14012b5fe1b07b9ed99a00565ed1d86348b
SHA25669c8425b75d3be48f68c1abf33bb9d30688bbd9d28809d92f9dc537393a3d3b4
SHA51202376153d198f415f53aabc67272c6042ee4f2c1048b3c5025200d8946f433669cd48295e1bfcd33d1fc8c24f4e1ff0dfb78e36926ad91a334e02718afa93042
-
Filesize
61KB
MD5df859feda2e7af11ce9b81ecb9090691
SHA12cca84df83856523c36b8da73e5bac5bd147771d
SHA25660cba11aef72dd5f445f90673fafe42c748f8cce0770ea6dad0c57611986b61c
SHA51201abb312363d01ef4d1336fcc0b33dee8fb22e5610be4fd4e0d8e2b4045785ca7ffc545721d1989394cea13716530d08105734a09d1a1bcfce4be5b110ae986d