Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
10/04/2024, 07:23
Static task
static1
Behavioral task
behavioral1
Sample
2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf.exe
Resource
win10v2004-20240226-en
General
-
Target
2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf.exe
-
Size
208KB
-
MD5
0f6e7efe4630bf314fd5d895f55bcd08
-
SHA1
764aa932c863988647b19e13917b288536bc144b
-
SHA256
2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf
-
SHA512
1360102c8b590029080cbefa6193c104557904398879ba6f60cf18e1696cd4e5d9325ca0aa204e7b89b4b23e4bd3d13a08a31d8e64f7d8fc7b1abf55bac1e2cf
-
SSDEEP
3072:MfK8TVSj1FQ021LSaDoKi6NgdgG6cCnebXQmL7A25A41:A5SZFQ71LSooKi6NwgG6cTLADy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1904519900-954640453-4250331663-1000\Control Panel\International\Geo\Nation 2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mozwnd1.lnk 2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1176 wrote to memory of 3704 1176 2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf.exe 96 PID 1176 wrote to memory of 3704 1176 2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf.exe 96 PID 1176 wrote to memory of 3704 1176 2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf.exe 96 PID 3704 wrote to memory of 5076 3704 cmd.exe 98 PID 3704 wrote to memory of 5076 3704 cmd.exe 98 PID 3704 wrote to memory of 5076 3704 cmd.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf.exe"C:\Users\Admin\AppData\Local\Temp\2699d5711c30178c92be712a69600ffb8adc6982b03b1d9cebb8e745ae4fbebf.exe"1⤵
- Checks computer location settings
- Drops startup file
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c xcopy "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mozwnd1.lnk" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp" /Y2⤵
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\SysWOW64\xcopy.exexcopy "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\mozwnd1.lnk" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\StartUp" /Y3⤵
- Enumerates system info in registry
PID:5076
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=3528 --field-trial-handle=2256,i,6057863739127169200,6895476048812676039,262144 --variations-seed-version /prefetch:81⤵PID:1912
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD56e0c317759f32a8bc79c79418fb501f6
SHA146f509687166f2888b7c03cdb6971de248386a07
SHA25690e1b8c0d317db2fdc8df3b516c9e1ed969e11ef7d25d4ff357634a879714258
SHA512e13c7d479f637c3317388680b6b74f1536004fffc8d23314280a53c3333f94e155eaf3483b7cbe2a472288cd2de3ee60803170c63ad396420aa0299d0b2065a7