Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2024, 20:01
Static task
static1
Behavioral task
behavioral1
Sample
905881104c4d1a9db04120bcc0a7b61e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
905881104c4d1a9db04120bcc0a7b61e.exe
Resource
win10v2004-20231215-en
General
-
Target
905881104c4d1a9db04120bcc0a7b61e.exe
-
Size
86KB
-
MD5
905881104c4d1a9db04120bcc0a7b61e
-
SHA1
94f186288bf8a279a586b732d62e86e577197d42
-
SHA256
3d4c74168dfb4381d5a37e356ebca604d86f4a4b8c0f9f00c408d2b9c9aa20cc
-
SHA512
11d2be3c6ce46d4817d25a3367f8eeb39e9f7572a3ea60398987989deb89644771b39e2125161fd930accaf81f2ae2298322a3a6044d82516e554d3e66a263be
-
SSDEEP
1536:fc8Hb7tShpOjB9S/dHs15rkOugsBQTedFpvFl:fJupW9SNwhsBVdFpvFl
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 905881104c4d1a9db04120bcc0a7b61e.exe -
Executes dropped EXE 1 IoCs
pid Process 636 WgaDisp.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\_WGA = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WgaDisp.exe" 905881104c4d1a9db04120bcc0a7b61e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: LoadsDriver 10 IoCs
pid Process 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 656 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found 4 Process not Found -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4072 wrote to memory of 636 4072 905881104c4d1a9db04120bcc0a7b61e.exe 85 PID 4072 wrote to memory of 636 4072 905881104c4d1a9db04120bcc0a7b61e.exe 85 PID 4072 wrote to memory of 636 4072 905881104c4d1a9db04120bcc0a7b61e.exe 85 PID 4072 wrote to memory of 4868 4072 905881104c4d1a9db04120bcc0a7b61e.exe 86 PID 4072 wrote to memory of 4868 4072 905881104c4d1a9db04120bcc0a7b61e.exe 86 PID 4072 wrote to memory of 4868 4072 905881104c4d1a9db04120bcc0a7b61e.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\905881104c4d1a9db04120bcc0a7b61e.exe"C:\Users\Admin\AppData\Local\Temp\905881104c4d1a9db04120bcc0a7b61e.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\WgaDisp.exe"C:\Users\Admin\AppData\Local\Temp\WgaDisp.exe"2⤵
- Executes dropped EXE
PID:636
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\_DelItB.bat" "2⤵PID:4868
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD573a951183974b5393697a3bed32cb0e8
SHA1de35a3a8bf562cfea8948e7204504d6c638d7c1c
SHA256f6a5d0ccbcd69dde460392b0d8b6f68c86c00942274eca54216ef9f817461cfc
SHA512f991ee0b4a6c5202cba3cd46bd27ca5ebbdc1ba63a67573649c97424f0eb3b58c6fd56183a888f1989e5fdfdc7507dab21232b7fbcb8cdf616f87bba42032827
-
Filesize
231B
MD5082b27f98a72166510aa9ad7ed266b9e
SHA188a5540a1d34fb233c527ba15fee604933d07e82
SHA2563daa8c72233a0a92c5bb15d387fa0fba22b7b63158967b7f4df9f5ff1f75f3f1
SHA51289b232653b9f31d81fcd8402197453f1d1b12f2a65cb2788f4a6190e4d524852255eef75024dcfb8535acccc33a3da83ebd1ad05202030128a62df824aaad1da