Analysis
-
max time kernel
153s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2024, 23:21
Static task
static1
Behavioral task
behavioral1
Sample
b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe
Resource
win10v2004-20240226-en
General
-
Target
b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe
-
Size
404KB
-
MD5
5ebff7118cf6779dd5848202d2f6ad0e
-
SHA1
1c61d610c6e70111429cb5320516a8fdafc0e212
-
SHA256
b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a
-
SHA512
a754a17a64322d26ab22ddf6875c5586b86f254fbd59808baeae654627042b83dcb5b94a9f3c9ca9784b2fd99773b383ebb5b5e7f0f6b598240acf774e14957e
-
SSDEEP
6144:Cck18MipfIUaQYu8tbS6JBcj0U5hjX/Tvf8MJYFW8jb/HVbdsifRe9+fHrGJS:CX8Djadu8J4YSjX/THmxr1bBGsHrGJS
Malware Config
Signatures
-
Detects executables packed with aPLib. 3 IoCs
resource yara_rule behavioral2/memory/4992-0-0x0000000000400000-0x0000000000479000-memory.dmp INDICATOR_EXE_Packed_aPLib behavioral2/memory/4992-2-0x0000000000400000-0x0000000000479000-memory.dmp INDICATOR_EXE_Packed_aPLib behavioral2/memory/4992-151-0x0000000000400000-0x0000000000479000-memory.dmp INDICATOR_EXE_Packed_aPLib -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent7 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\220DBH~1.EXE" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Eset\Nod svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4992 set thread context of 4576 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe 4576 svchost.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 4992 wrote to memory of 4576 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 88 PID 4992 wrote to memory of 4576 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 88 PID 4992 wrote to memory of 4576 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 88 PID 4992 wrote to memory of 4576 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 88 PID 4992 wrote to memory of 4576 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 88 PID 4992 wrote to memory of 4576 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 88 PID 4992 wrote to memory of 4576 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 88 PID 4992 wrote to memory of 4576 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 88 PID 4992 wrote to memory of 4576 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 88 PID 4992 wrote to memory of 4576 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 88 PID 4992 wrote to memory of 4576 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 88 PID 4992 wrote to memory of 3600 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 89 PID 4992 wrote to memory of 3600 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 89 PID 4992 wrote to memory of 3600 4992 b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe"C:\Users\Admin\AppData\Local\Temp\b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\220dbhf28f.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
PID:4576
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\vsh9EFD.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\b02793fc4ca7de6d6267bc1e50dcb50f536e43f7fcca60cc3a9f7f48d316150a.exe""2⤵PID:3600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD58aa6644e377377bb8c3ce052bb8bda0f
SHA16610c6dd8dc2179cb3d214cfdc017b4df76e9e1d
SHA2562a6c732f8a05b1e66c4a7e54d8fb0e39118b3a935c211cf393e91b9a02aee718
SHA5127ea252a208bf7ff77c63b096a982f9f545ae2abee09829f3946d2835ce20c469d19b6c93485d8814d60e761ba349102a44ebbb0d9ea07941136f62cfe07c3424