Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
26/04/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
4d9b176b2ffc7f8e53fc592517cb84da8da6d122d8c1e0fac1c7eb4bce39e9bf.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
4d9b176b2ffc7f8e53fc592517cb84da8da6d122d8c1e0fac1c7eb4bce39e9bf.exe
Resource
win10v2004-20240412-en
General
-
Target
4d9b176b2ffc7f8e53fc592517cb84da8da6d122d8c1e0fac1c7eb4bce39e9bf.exe
-
Size
1.6MB
-
MD5
7d0e2b46361001d7ae70743c786387d2
-
SHA1
8e1445c713fd428030136a950f35a1590e12baa0
-
SHA256
4d9b176b2ffc7f8e53fc592517cb84da8da6d122d8c1e0fac1c7eb4bce39e9bf
-
SHA512
e87da458fd7e60212d42d50046dba97405e56e01c6eacac5321ed87ee9bcdd58c2e492fa0bd86b3ef08291973731371031fce5ec1f63404d04a76923d88f8847
-
SSDEEP
49152:j5219/B28j5219/BUtTziWgc01sOvrMlg:jG952YG95UtTGWE1sGgg
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\system32\drivers\etc\hosts attrib.exe File opened for modification C:\Windows\system32\drivers\etc\hosts cmd.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation 4d9b176b2ffc7f8e53fc592517cb84da8da6d122d8c1e0fac1c7eb4bce39e9bf.exe -
Executes dropped EXE 1 IoCs
pid Process 2056 SUPORTE.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 16 IoCs
pid Process 4980 timeout.exe 2612 timeout.exe 4448 timeout.exe 4308 timeout.exe 3396 timeout.exe 1484 timeout.exe 1568 timeout.exe 2260 timeout.exe 5112 timeout.exe 4524 timeout.exe 4688 timeout.exe 1044 timeout.exe 1980 timeout.exe 1532 timeout.exe 4552 timeout.exe 2268 timeout.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 4732 wrote to memory of 2056 4732 4d9b176b2ffc7f8e53fc592517cb84da8da6d122d8c1e0fac1c7eb4bce39e9bf.exe 86 PID 4732 wrote to memory of 2056 4732 4d9b176b2ffc7f8e53fc592517cb84da8da6d122d8c1e0fac1c7eb4bce39e9bf.exe 86 PID 4732 wrote to memory of 5040 4732 4d9b176b2ffc7f8e53fc592517cb84da8da6d122d8c1e0fac1c7eb4bce39e9bf.exe 88 PID 4732 wrote to memory of 5040 4732 4d9b176b2ffc7f8e53fc592517cb84da8da6d122d8c1e0fac1c7eb4bce39e9bf.exe 88 PID 5040 wrote to memory of 2220 5040 cmd.exe 90 PID 5040 wrote to memory of 2220 5040 cmd.exe 90 PID 5040 wrote to memory of 4320 5040 cmd.exe 91 PID 5040 wrote to memory of 4320 5040 cmd.exe 91 PID 5040 wrote to memory of 2944 5040 cmd.exe 93 PID 5040 wrote to memory of 2944 5040 cmd.exe 93 PID 4732 wrote to memory of 2440 4732 4d9b176b2ffc7f8e53fc592517cb84da8da6d122d8c1e0fac1c7eb4bce39e9bf.exe 94 PID 4732 wrote to memory of 2440 4732 4d9b176b2ffc7f8e53fc592517cb84da8da6d122d8c1e0fac1c7eb4bce39e9bf.exe 94 PID 2440 wrote to memory of 2672 2440 cmd.exe 96 PID 2440 wrote to memory of 2672 2440 cmd.exe 96 PID 2440 wrote to memory of 1532 2440 cmd.exe 97 PID 2440 wrote to memory of 1532 2440 cmd.exe 97 PID 2440 wrote to memory of 1568 2440 cmd.exe 101 PID 2440 wrote to memory of 1568 2440 cmd.exe 101 PID 2440 wrote to memory of 2260 2440 cmd.exe 102 PID 2440 wrote to memory of 2260 2440 cmd.exe 102 PID 2440 wrote to memory of 4552 2440 cmd.exe 110 PID 2440 wrote to memory of 4552 2440 cmd.exe 110 PID 2440 wrote to memory of 5112 2440 cmd.exe 113 PID 2440 wrote to memory of 5112 2440 cmd.exe 113 PID 2440 wrote to memory of 2268 2440 cmd.exe 114 PID 2440 wrote to memory of 2268 2440 cmd.exe 114 PID 2440 wrote to memory of 2612 2440 cmd.exe 115 PID 2440 wrote to memory of 2612 2440 cmd.exe 115 PID 2440 wrote to memory of 4448 2440 cmd.exe 117 PID 2440 wrote to memory of 4448 2440 cmd.exe 117 PID 2440 wrote to memory of 4688 2440 cmd.exe 118 PID 2440 wrote to memory of 4688 2440 cmd.exe 118 PID 2440 wrote to memory of 1980 2440 cmd.exe 119 PID 2440 wrote to memory of 1980 2440 cmd.exe 119 PID 2440 wrote to memory of 4308 2440 cmd.exe 121 PID 2440 wrote to memory of 4308 2440 cmd.exe 121 PID 2440 wrote to memory of 3396 2440 cmd.exe 122 PID 2440 wrote to memory of 3396 2440 cmd.exe 122 PID 2440 wrote to memory of 4980 2440 cmd.exe 123 PID 2440 wrote to memory of 4980 2440 cmd.exe 123 PID 2440 wrote to memory of 1484 2440 cmd.exe 125 PID 2440 wrote to memory of 1484 2440 cmd.exe 125 PID 2440 wrote to memory of 4524 2440 cmd.exe 126 PID 2440 wrote to memory of 4524 2440 cmd.exe 126 PID 2440 wrote to memory of 1044 2440 cmd.exe 127 PID 2440 wrote to memory of 1044 2440 cmd.exe 127 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 4320 attrib.exe 2944 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4d9b176b2ffc7f8e53fc592517cb84da8da6d122d8c1e0fac1c7eb4bce39e9bf.exe"C:\Users\Admin\AppData\Local\Temp\4d9b176b2ffc7f8e53fc592517cb84da8da6d122d8c1e0fac1c7eb4bce39e9bf.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\Addon\Arquivos de Programas\Adicionais\SUPORTE.exe"C:\Users\Admin\AppData\Local\Temp\Addon\Arquivos de Programas\Adicionais\SUPORTE.exe"2⤵
- Executes dropped EXE
PID:2056
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Addon\Arquivos de Programas\Adicionais\PRIVATE-USER.cmd" "2⤵
- Drops file in Drivers directory
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\system32\cacls.exe"C:\Windows\system32\cacls.exe" "C:\Windows\system32\config\system"3⤵PID:2220
-
-
C:\Windows\system32\attrib.exeattrib -r C:\Windows\system32\drivers\etc\hosts3⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:4320
-
-
C:\Windows\system32\attrib.exeattrib +r C:\Windows\system32\drivers\etc\hosts3⤵
- Drops file in Drivers directory
- Views/modifies file attributes
PID:2944
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Addon\Arquivos de Programas\Adicionais\ACTIVATED.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\system32\mode.commode con: cols=80 lines=103⤵PID:2672
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:1532
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:1568
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:2260
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:4552
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:5112
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:2268
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:2612
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:4448
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:4688
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:1980
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:4308
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:3396
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:4980
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:1484
-
-
C:\Windows\system32\timeout.exetimeout /t 1 /nobreak3⤵
- Delays execution with timeout.exe
PID:4524
-
-
C:\Windows\system32\timeout.exetimeout /t 33⤵
- Delays execution with timeout.exe
PID:1044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
641B
MD5d6ac638f591dba96bbf9e33faf401f29
SHA142631098992a88920732cbc9eee0ee72d65f84d0
SHA256e8220d84abad5ce2362917f6a0f1a213fc4e65f72c7a5284bbd95cf453175ca0
SHA512d99d185bbaa7b1cc3f9a8ccdc7c63d00db1a309a1d1aff8f8c714acba47432569183acab52187d49abf2c62b2c31fa8cb4c69123344ec80c3f1853ec2b4b064d
-
Filesize
9KB
MD50c739d0021c968abbd85ac72f1109754
SHA1e4fb728296286bb927e33558d0f70f8d07fda6ac
SHA2569057f37af86063ffc0d4c553e418f25888090ed6be97790f46556626edfc698b
SHA512ff45765783d7bbf63a44dd853373d93df7676afd5c36e9bd74b746ce92c365a66cc8ba356536c96262e2a9181e9331cf87f34e2ad94795501f18295c211feead
-
Filesize
1.2MB
MD52aca419a8e43750a77ca1d46ebcfcc5d
SHA13786bb3f69504d9eff9ad12999603fc5e2922a84
SHA2568ab9aee1ae70e86d6f9945e84310bc8a21c262535db4c09201eab814731f6a41
SHA512f61cfc7951d4ed0478e3670b8f4e72600e20ddb85a6a40a2f2b0d633aa76208ddf5581f9caa655ea1a98a9f7e1643c538c3b32daa9318b8800c83f2cfc8b494a
-
Filesize
8KB
MD5246299d2385306132314f36346f0a642
SHA1825b9b675bcb1f991be778c429ab1bcdb26ba832
SHA256149640bff7e404334999f040576ea3dbebee0e3203ac761898591669c305e88a
SHA5126239fd5820cc365a8842073c836e24a8fe92843e538bea876fd61da389e79031582e1a7bc26d92ae20fce535961ad63184cda2f4267cce5d1feb1b857a29fc63