Analysis
-
max time kernel
129s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
19-05-2024 15:25
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20240508-en
General
-
Target
file.exe
-
Size
2.5MB
-
MD5
ca3b49582edf9cab4714a35647907f3e
-
SHA1
e9b265e85b333051d7014a7352747d09634a9fe6
-
SHA256
05f41f450584e2f2a99ffe86ec699b2f1569b1080ffa801ca8b4adf3b6d1c832
-
SHA512
83fd5d6bcf85df317a73d8fe89782fbe3541972bd5d187c749681e939024f22536c2ed1c41bfa37b46bd45b20c589e2b997923d8e8e49bb6fc68f58908e34fa9
-
SSDEEP
49152:aF5alGJpSQXYVCV/EVCLV2Hpaht/rFoeeA6ASh2jQMTREJcI:aF5alGhXJ5EVCsitzFoeeA6jYnPI
Malware Config
Extracted
systembc
cobusabobus.cam:4001
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
file.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3906287020-2915474608-1755617787-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 7 IoCs
Processes:
7z.exe7z.exe7z.exe7z.exesvchsot.exeralsnbm.exeralsnbm.exepid process 2236 7z.exe 4580 7z.exe 4476 7z.exe 4212 7z.exe 3800 svchsot.exe 4360 ralsnbm.exe 6128 ralsnbm.exe -
Loads dropped DLL 4 IoCs
Processes:
7z.exe7z.exe7z.exe7z.exepid process 2236 7z.exe 4580 7z.exe 4476 7z.exe 4212 7z.exe -
Drops file in Windows directory 2 IoCs
Processes:
svchsot.exedescription ioc process File created C:\Windows\Tasks\ralsnbm.job svchsot.exe File opened for modification C:\Windows\Tasks\ralsnbm.job svchsot.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
svchsot.exepid process 3800 svchsot.exe 3800 svchsot.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
7z.exe7z.exe7z.exe7z.exedescription pid process Token: SeRestorePrivilege 2236 7z.exe Token: 35 2236 7z.exe Token: SeSecurityPrivilege 2236 7z.exe Token: SeSecurityPrivilege 2236 7z.exe Token: SeRestorePrivilege 4580 7z.exe Token: 35 4580 7z.exe Token: SeSecurityPrivilege 4580 7z.exe Token: SeSecurityPrivilege 4580 7z.exe Token: SeRestorePrivilege 4476 7z.exe Token: 35 4476 7z.exe Token: SeSecurityPrivilege 4476 7z.exe Token: SeSecurityPrivilege 4476 7z.exe Token: SeRestorePrivilege 4212 7z.exe Token: 35 4212 7z.exe Token: SeSecurityPrivilege 4212 7z.exe Token: SeSecurityPrivilege 4212 7z.exe -
Suspicious use of WriteProcessMemory 17 IoCs
Processes:
file.execmd.exedescription pid process target process PID 3532 wrote to memory of 1992 3532 file.exe cmd.exe PID 3532 wrote to memory of 1992 3532 file.exe cmd.exe PID 1992 wrote to memory of 4944 1992 cmd.exe mode.com PID 1992 wrote to memory of 4944 1992 cmd.exe mode.com PID 1992 wrote to memory of 2236 1992 cmd.exe 7z.exe PID 1992 wrote to memory of 2236 1992 cmd.exe 7z.exe PID 1992 wrote to memory of 4580 1992 cmd.exe 7z.exe PID 1992 wrote to memory of 4580 1992 cmd.exe 7z.exe PID 1992 wrote to memory of 4476 1992 cmd.exe 7z.exe PID 1992 wrote to memory of 4476 1992 cmd.exe 7z.exe PID 1992 wrote to memory of 4212 1992 cmd.exe 7z.exe PID 1992 wrote to memory of 4212 1992 cmd.exe 7z.exe PID 1992 wrote to memory of 3240 1992 cmd.exe attrib.exe PID 1992 wrote to memory of 3240 1992 cmd.exe attrib.exe PID 1992 wrote to memory of 3800 1992 cmd.exe svchsot.exe PID 1992 wrote to memory of 3800 1992 cmd.exe svchsot.exe PID 1992 wrote to memory of 3800 1992 cmd.exe svchsot.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\main\main.bat" /S"2⤵
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\system32\mode.commode 65,103⤵PID:4944
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e file.zip -p11126109881796147432108526241 -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2236
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_3.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4580
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_2.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\main\7z.exe7z.exe e extracted/file_1.zip -oextracted3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4212
-
-
C:\Windows\system32\attrib.exeattrib +H "svchsot.exe"3⤵
- Views/modifies file attributes
PID:3240
-
-
C:\Users\Admin\AppData\Local\Temp\main\svchsot.exe"svchsot.exe"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3800
-
-
-
C:\ProgramData\weoavh\ralsnbm.exeC:\ProgramData\weoavh\ralsnbm.exe start21⤵
- Executes dropped EXE
PID:4360
-
C:\ProgramData\weoavh\ralsnbm.exeC:\ProgramData\weoavh\ralsnbm.exe start21⤵
- Executes dropped EXE
PID:6128
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.6MB
MD572491c7b87a7c2dd350b727444f13bb4
SHA11e9338d56db7ded386878eab7bb44b8934ab1bc7
SHA25634ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891
SHA512583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511
-
Filesize
458KB
MD5619f7135621b50fd1900ff24aade1524
SHA16c7ea8bbd435163ae3945cbef30ef6b9872a4591
SHA256344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2
SHA5122c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628
-
Filesize
2.2MB
MD598a4638d9c34816d7b9ceca56379ef36
SHA1734338ab7319cd8c62683b3d94b623290851ffa4
SHA2567b4ad59c5db9a9b287f0b678ce5d7bfa1e9e11492e08f4d3f9e3d134b920237e
SHA512b781f51995363e8e715a5e38dee35f73932962ea070ed85ec070ee537e81bfc69a46c8ca36b15d490d4e6bc1db583cd10d944bf0f975959ad4549bd52ccdff93
-
Filesize
8KB
MD587b235104d0b38a943c6344c93c95fce
SHA19ebc8c3025c90c655632cba4ae303e49c58d9565
SHA25698ae32890e4bdd3bb33fa098c63f78638f6949984053d31d187f59dc331ceffd
SHA512a249a562dcea901b6c030afa82712fc1652e20981bab3187f7ede21930c1f85570d2d2aa03e09fe17303ed52211db752e1119dd22f4671d684fd90451e57dc8e
-
Filesize
8KB
MD50a0993feaf5f1f5a5784348a4e4093c3
SHA16079c00bdcab68054bb0b0e7ff7d0c1b5e8ed22e
SHA2569dda9848257c29f5c463e46f712025fe61088e80162048b27c6dc840b97d0bbe
SHA512496e1d474b5643981c570289ba9ede578a9e8c52ce0e476511e745b6bbd11c2ded86911738fa5a38d29a4d080213f2bb0b9a42b5c05c87e34c8d22120a6dc33e
-
Filesize
1.6MB
MD5d73b913c2b884a2aa163394ea0d1bb6d
SHA1144c5bc242b6de11f7caa22887412e54a2c44274
SHA256c09eeee2d091c2dc32de745e858e538c2a9582479f11bb28702e71a03e86239c
SHA512322edd1668985b5d3fb51ac35748131b57f8fde6e5094cf2feeef5ed718ae117bdf17dc6b7399025c7af9e3c914d80642fd653af9877e9dc0751d0f7596dd637
-
Filesize
1.6MB
MD5cd52743b77ca507b74a172f952f72e72
SHA13d4f09ce7801320a5aec921d06bab5cb7b900ef6
SHA2565141c540ebc7182c3fd04327710629b7c67aff6681233ed1c016760386b3e493
SHA51264b3e42f767cd295bf0ee02d2d3189506c51cdf0cc88e31814ddb2895a9d1ff7aae88f0e284a7542d0a514a2dfd71b09e8e1506da964a27c5aa66d11ba994f62
-
Filesize
465B
MD54333b6c9e2ac1168f592332fb3c26592
SHA1e98a2bb4edebaa886dabef3181768c5ed7e6b794
SHA2566a4faa98d6fe1d6a65ea2c162f96daa5974bcb3558ad9d98158d215ffe5de06c
SHA5121456622035353c2dbe2f902883657cff3da5ea03ff30c460d0e0525cce2b5cc958d3a469c436ff0183f42fb0121ae8c17a3143f14affa62471957e4443e27351
-
Filesize
16KB
MD54f01c3d7439dde153ff0110a26e2a71c
SHA140d7203ad4e1fd40e13a56e6f747ee480740873c
SHA256cfb1fd0adf528fcf14647cf3fcd85fb7e4fddd2167b36f9e8b2424b62453df28
SHA512513d09b80e1ac80813bc691e71cdf5348478157350e43b9daed27741b7f5a7a16b2ae4d88ee9951395747c7f2a93ff0c1f2c3753a9e3bad2e2607767a1e3d28e