Analysis
-
max time kernel
141s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
22-04-2024 07:48
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20240226-en
General
-
Target
tmp.exe
-
Size
48KB
-
MD5
768b7b0bc0eeb12c635b7964c718ec5f
-
SHA1
2478a9f51b8c14e3a6e4de42d799520e33387589
-
SHA256
10a7e65a3a7aa1a7bbf4c0f412425d840df9f6d211f3c1badc41240f4145d501
-
SHA512
067ce6ef6c7fd25d65f7e4f751581df3a365374230e80a9eb0890831530d3b6b596c1e22fff8f3524a9586c35f927666ae68e2407ecf1805a534fa2298a129c9
-
SSDEEP
768:zynb12Aw5J6HC4kq5Jp9bjAzhyY55J+NStcEeUlyqgZl4p67xHhPC:Ub1MsHz3JDwhyWr+N95OTga6O
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SICi\Parameters\ServiceDll = "C:\\Program Files (x86)\\240639937.dll" tmp.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 4936 SICi.exe -
Loads dropped DLL 3 IoCs
pid Process 4268 tmp.exe 3644 svchost.exe 4936 SICi.exe -
Creates a Windows Service
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\SICi.exe svchost.exe File opened for modification C:\Windows\SysWOW64\SICi.exe svchost.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\240639937.dll tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SICi.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz SICi.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum SICi.exe Key created \REGISTRY\USER\.DEFAULT\Software SICi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft SICi.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie SICi.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" SICi.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 4700 PING.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4268 tmp.exe 4268 tmp.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4268 tmp.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4268 tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4268 wrote to memory of 788 4268 tmp.exe 93 PID 4268 wrote to memory of 788 4268 tmp.exe 93 PID 4268 wrote to memory of 788 4268 tmp.exe 93 PID 3644 wrote to memory of 4936 3644 svchost.exe 95 PID 3644 wrote to memory of 4936 3644 svchost.exe 95 PID 3644 wrote to memory of 4936 3644 svchost.exe 95 PID 788 wrote to memory of 4700 788 cmd.exe 96 PID 788 wrote to memory of 4700 788 cmd.exe 96 PID 788 wrote to memory of 4700 788 cmd.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Sets DLL path for service in the registry
- Checks computer location settings
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 1 && del /f/q "C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:788 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 13⤵
- Runs ping.exe
PID:4700
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "SICi"1⤵PID:4580
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k "SICi"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\SysWOW64\SICi.exeC:\Windows\system32\SICi.exe "c:\program files (x86)\240639937.dll",MainThread2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Modifies data under HKEY_USERS
PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=1360 --field-trial-handle=2272,i,4858140932023865871,5726683989663339295,262144 --variations-seed-version /prefetch:81⤵PID:4536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
25KB
MD5a32cc9fb4286b4912843dbebff5fc5b2
SHA1c2f45a8ebc92a34e9d94160206fbe75fb3d500d6
SHA2568875e15d206f1156f5581c0020c695f1751deaaed83816d1298719be27c57a4d
SHA51247106d800232f6b58d040502b66afe0470810286f3638f85c0cbc6c6919c2fc2d8016d464a0adc5f3afeaeddc67f984fa19b20d1f978fda15269ee0dad1691c7
-
Filesize
60KB
MD5889b99c52a60dd49227c5e485a016679
SHA18fa889e456aa646a4d0a4349977430ce5fa5e2d7
SHA2566cbe0e1f046b13b29bfa26f8b368281d2dda7eb9b718651d5856f22cc3e02910
SHA51208933106eaf338dd119c45cbf1f83e723aff77cc0f8d3fc84e36253b1eb31557a54211d1d5d1cb58958188e32064d451f6c66a24b3963cccd3de07299ab90641