Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
07/05/2024, 11:17
Static task
static1
Behavioral task
behavioral1
Sample
1003.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1003.exe
Resource
win10v2004-20240426-en
General
-
Target
1003.exe
-
Size
255KB
-
MD5
0246bb54723bd4a49444aa4ca254845a
-
SHA1
151382e82fbcfdf188b347911bd6a34293c14878
-
SHA256
8cf50ae247445de2e570f19705236ed4b1e19f75ca15345e5f00857243bc0e9b
-
SHA512
8b920699602ad00015ececf7f58a181e311a6726aece237de86fcc455d0e6fcb587fe46f6ef2e86a34fe1c52d835c5e2a547874a7906315247f07daa30e4323a
-
SSDEEP
6144:m28cv8eNLO1cy4uWj6x5OEbHyL3IKwCQLcw:m/MLNLO1B5TRbSbI/Cg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\Control Panel\International\Geo\Nation 1003.exe -
Executes dropped EXE 1 IoCs
pid Process 1904 9B25127ADC.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9B25127ADC = "C:\\Users\\Admin\\AppData\\Roaming\\9B25127ADC.exe" 1003.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*9B25127ADC = "C:\\Users\\Admin\\AppData\\Roaming\\9B25127ADC.exe" 1003.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\9B25127ADC = "C:\\Users\\Admin\\AppData\\Roaming\\9B25127ADC.exe" 9B25127ADC.exe Set value (str) \REGISTRY\USER\S-1-5-21-1162180587-977231257-2194346871-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\*9B25127ADC = "C:\\Users\\Admin\\AppData\\Roaming\\9B25127ADC.exe" 9B25127ADC.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Kills process with taskkill 1 IoCs
pid Process 3352 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2616 1003.exe Token: SeDebugPrivilege 3352 taskkill.exe Token: SeDebugPrivilege 1904 9B25127ADC.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2616 wrote to memory of 1904 2616 1003.exe 92 PID 2616 wrote to memory of 1904 2616 1003.exe 92 PID 2616 wrote to memory of 3352 2616 1003.exe 93 PID 2616 wrote to memory of 3352 2616 1003.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\1003.exe"C:\Users\Admin\AppData\Local\Temp\1003.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\9B25127ADC.exe"C:\Users\Admin\AppData\Roaming\9B25127ADC.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1904
-
-
C:\Windows\SYSTEM32\taskkill.exe"taskkill" /F /IM 1003.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3352
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
255KB
MD50246bb54723bd4a49444aa4ca254845a
SHA1151382e82fbcfdf188b347911bd6a34293c14878
SHA2568cf50ae247445de2e570f19705236ed4b1e19f75ca15345e5f00857243bc0e9b
SHA5128b920699602ad00015ececf7f58a181e311a6726aece237de86fcc455d0e6fcb587fe46f6ef2e86a34fe1c52d835c5e2a547874a7906315247f07daa30e4323a