Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
19/04/2024, 17:39
Behavioral task
behavioral1
Sample
af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e.exe
Resource
win10v2004-20240412-en
General
-
Target
af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e.exe
-
Size
27KB
-
MD5
1993109480c1aa89a053dc451b5a8856
-
SHA1
39d2015180cc156651a7119f1caebe3eb9646ed6
-
SHA256
af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e
-
SHA512
ec608f49a114f29143465b48033c25713f56348ac8f9c1ec4e51417d81cd73af4f9298fecb6832cf23643e386801bb584f34478da9d7a34fb8149ec9bfa4f88a
-
SSDEEP
384:eLKFBjKLtFGodHntUD0g9WPMy2QqMRAQk93vmhm7UMKmIEecKdbXTzm9bVhcaQ63:IyBMkGSAfRA/vMHTi9bDQ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\Control Panel\International\Geo\Nation af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows.lnk System32.EXE.exe -
Executes dropped EXE 1 IoCs
pid Process 1968 System32.EXE.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" System32.EXE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\System32.EXE.exe" af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" System32.EXE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows2 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" System32.EXE.exe Set value (str) \REGISTRY\USER\S-1-5-21-2177723727-746291240-1644359950-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\Windows.URL" System32.EXE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe Token: 33 1968 System32.EXE.exe Token: SeIncBasePriorityPrivilege 1968 System32.EXE.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 724 wrote to memory of 1968 724 af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e.exe 92 PID 724 wrote to memory of 1968 724 af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e.exe 92 PID 724 wrote to memory of 1968 724 af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e.exe 92 PID 724 wrote to memory of 636 724 af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e.exe 93 PID 724 wrote to memory of 636 724 af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e.exe 93 PID 724 wrote to memory of 636 724 af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e.exe 93 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 636 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e.exe"C:\Users\Admin\AppData\Local\Temp\af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e.exe"1⤵
- Checks computer location settings
- Drops startup file
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Roaming\System32.EXE.exe"C:\Users\Admin\AppData\Roaming\System32.EXE.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +r +s "C:\Users\Admin\AppData\Roaming\System32.EXE.exe"2⤵
- Views/modifies file attributes
PID:636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55c3d082d31d442594e4fd595f7b0f3e3
SHA1c249f97482ae46e65af19aee9859ee426796fcb6
SHA256435fdab631402ac8c5f5923e06ee91241739dea2939df8233abf759c97740225
SHA512fc78244255b81c458c5406d53c738466480389ad4eae6935ae9be36e0c279c9edbd9cc0e086f0d2a5eef3fe798f85c283f72735d9512ea233af8908bc1a04a71
-
Filesize
1KB
MD57be3173e724ba5bb1bb5a54b1e5356e9
SHA1a5de4d0a414c75e5dba4a2ecf28b4c7175ffa320
SHA256ee2dc66937c4a8ae53cd36a789100839e75d9d509d66f0d3a283629020f8455c
SHA512c96420b0da8e99ded5bc1bb3a52cf8e8455c90281719049957fd7fec38cb58cfb20abfd5f095ba7723853b742dd9deb5c0fd201ebc3d20bc9a4e98f3e74af4c3
-
Filesize
27KB
MD51993109480c1aa89a053dc451b5a8856
SHA139d2015180cc156651a7119f1caebe3eb9646ed6
SHA256af2d5ae5ed7a72a3fa6a36cda93e163b84d8ad70a78afb08bcd1afa63d54f61e
SHA512ec608f49a114f29143465b48033c25713f56348ac8f9c1ec4e51417d81cd73af4f9298fecb6832cf23643e386801bb584f34478da9d7a34fb8149ec9bfa4f88a