Analysis
-
max time kernel
149s -
max time network
161s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 22:55
Static task
static1
Behavioral task
behavioral1
Sample
82db606d3c1ed47c73a578c4f43f045c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
82db606d3c1ed47c73a578c4f43f045c.exe
Resource
win10v2004-20240226-en
General
-
Target
82db606d3c1ed47c73a578c4f43f045c.exe
-
Size
71KB
-
MD5
82db606d3c1ed47c73a578c4f43f045c
-
SHA1
1d7ef55ceadb049b7a124724f513cdbdd3d9461c
-
SHA256
f90622a62b327c6e24706d0523c70facd69386ebac78089be45acfc0c61ba026
-
SHA512
d5e927310e8bfa344312db753faf33c30965df237d88ec8c3974a9676990ac402667a3266756acc0ccc6d9fc836d8c20fa87966040c1f1c742570445189801ad
-
SSDEEP
768:ZrItKyw5WHXfQmjIiIk9ecAx7pP1EPU96MyXPdtldE9bIIIwjk8:Zr3Z5IfQmv81x7pP1r3yXPdtnyj5
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 4456 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-557049126-2506969350-2798870634-1000\Control Panel\International\Geo\Nation 82db606d3c1ed47c73a578c4f43f045c.exe -
Executes dropped EXE 1 IoCs
pid Process 2912 cwshost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\cwshost.exe 82db606d3c1ed47c73a578c4f43f045c.exe File opened for modification C:\Windows\Debug\cwshost.exe 82db606d3c1ed47c73a578c4f43f045c.exe File opened for modification C:\Windows\Debug\cwshost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cwshost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz cwshost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2220 82db606d3c1ed47c73a578c4f43f045c.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2220 wrote to memory of 4456 2220 82db606d3c1ed47c73a578c4f43f045c.exe 85 PID 2220 wrote to memory of 4456 2220 82db606d3c1ed47c73a578c4f43f045c.exe 85 PID 2220 wrote to memory of 4456 2220 82db606d3c1ed47c73a578c4f43f045c.exe 85 PID 2220 wrote to memory of 1684 2220 82db606d3c1ed47c73a578c4f43f045c.exe 91 PID 2220 wrote to memory of 1684 2220 82db606d3c1ed47c73a578c4f43f045c.exe 91 PID 2220 wrote to memory of 1684 2220 82db606d3c1ed47c73a578c4f43f045c.exe 91 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 4456 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\82db606d3c1ed47c73a578c4f43f045c.exe"C:\Users\Admin\AppData\Local\Temp\82db606d3c1ed47c73a578c4f43f045c.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\cwshost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:4456
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\82DB60~1.EXE > nul2⤵PID:1684
-
-
C:\Windows\Debug\cwshost.exeC:\Windows\Debug\cwshost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
71KB
MD52931c350713d7601fb401be85d105ef5
SHA18305addb52a72ea29c37534f048283cf71b103d4
SHA2561356136db57d81e980a6c929636cd86228ecbc6b2f52da55a7babb604203aa2e
SHA5124590179b8efa884946ba18ce53ec7ae0aba0036a7a924c758f20a50757c5880db55c8eaca5004b14064050e1eb16c960496c3cf169a25276732575bfec5cbfc5