Analysis
-
max time kernel
27s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 19:28
Static task
static1
Behavioral task
behavioral1
Sample
07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe
Resource
win10v2004-20240508-en
General
-
Target
07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe
-
Size
128KB
-
MD5
29a091e765d47bfbaef72a032610bb00
-
SHA1
a2617dce73d769f191781a9fbc4bd4e5afab1f46
-
SHA256
07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba
-
SHA512
ddf73d7da051c29841fac251d9a9d41d4c0d389b69d6cd313352f92cf043d420614aa18041b65b859f3e7d00daabe02649ab3f0cee560c6d8bf761f16bda4f3d
-
SSDEEP
3072:VvgwhTm5amkqIJS20hD7Me+QpWT21/Blx77x19:jmhUKWyJBlx77/9
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\Control Panel\International\Geo\Nation 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe -
Executes dropped EXE 3 IoCs
Processes:
07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exedatafli.exedatafli.exepid process 1464 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe 452 datafli.exe 1184 datafli.exe -
Processes:
resource yara_rule behavioral2/memory/1464-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1464-17-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1464-19-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1464-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1184-63-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-3558294865-3673844354-2255444939-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Key Name = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName\\datafli.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
Processes:
07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exedatafli.exedescription pid process target process PID 820 set thread context of 1680 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe svchost.exe PID 820 set thread context of 1464 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe PID 452 set thread context of 856 452 datafli.exe svchost.exe PID 452 set thread context of 1184 452 datafli.exe datafli.exe PID 452 set thread context of 0 452 datafli.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe 1680 svchost.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
Processes:
datafli.exedescription pid process Token: SeDebugPrivilege 1184 datafli.exe Token: SeDebugPrivilege 1184 datafli.exe Token: SeDebugPrivilege 1184 datafli.exe Token: SeDebugPrivilege 1184 datafli.exe Token: SeDebugPrivilege 1184 datafli.exe Token: SeDebugPrivilege 1184 datafli.exe Token: SeDebugPrivilege 1184 datafli.exe Token: SeDebugPrivilege 1184 datafli.exe Token: SeDebugPrivilege 1184 datafli.exe Token: SeDebugPrivilege 1184 datafli.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exesvchost.exe07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exedatafli.exesvchost.exedatafli.exepid process 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe 1680 svchost.exe 1464 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe 452 datafli.exe 856 svchost.exe 1184 datafli.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.execmd.exedatafli.exedescription pid process target process PID 820 wrote to memory of 1680 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe svchost.exe PID 820 wrote to memory of 1680 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe svchost.exe PID 820 wrote to memory of 1680 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe svchost.exe PID 820 wrote to memory of 1680 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe svchost.exe PID 820 wrote to memory of 1680 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe svchost.exe PID 820 wrote to memory of 1680 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe svchost.exe PID 820 wrote to memory of 1680 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe svchost.exe PID 820 wrote to memory of 1680 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe svchost.exe PID 820 wrote to memory of 1680 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe svchost.exe PID 820 wrote to memory of 1464 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe PID 820 wrote to memory of 1464 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe PID 820 wrote to memory of 1464 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe PID 820 wrote to memory of 1464 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe PID 820 wrote to memory of 1464 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe PID 820 wrote to memory of 1464 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe PID 820 wrote to memory of 1464 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe PID 820 wrote to memory of 1464 820 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe PID 1464 wrote to memory of 3252 1464 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe cmd.exe PID 1464 wrote to memory of 3252 1464 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe cmd.exe PID 1464 wrote to memory of 3252 1464 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe cmd.exe PID 3252 wrote to memory of 216 3252 cmd.exe reg.exe PID 3252 wrote to memory of 216 3252 cmd.exe reg.exe PID 3252 wrote to memory of 216 3252 cmd.exe reg.exe PID 1464 wrote to memory of 452 1464 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe datafli.exe PID 1464 wrote to memory of 452 1464 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe datafli.exe PID 1464 wrote to memory of 452 1464 07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe datafli.exe PID 452 wrote to memory of 856 452 datafli.exe svchost.exe PID 452 wrote to memory of 856 452 datafli.exe svchost.exe PID 452 wrote to memory of 856 452 datafli.exe svchost.exe PID 452 wrote to memory of 856 452 datafli.exe svchost.exe PID 452 wrote to memory of 856 452 datafli.exe svchost.exe PID 452 wrote to memory of 856 452 datafli.exe svchost.exe PID 452 wrote to memory of 856 452 datafli.exe svchost.exe PID 452 wrote to memory of 856 452 datafli.exe svchost.exe PID 452 wrote to memory of 856 452 datafli.exe svchost.exe PID 452 wrote to memory of 1184 452 datafli.exe datafli.exe PID 452 wrote to memory of 1184 452 datafli.exe datafli.exe PID 452 wrote to memory of 1184 452 datafli.exe datafli.exe PID 452 wrote to memory of 1184 452 datafli.exe datafli.exe PID 452 wrote to memory of 1184 452 datafli.exe datafli.exe PID 452 wrote to memory of 1184 452 datafli.exe datafli.exe PID 452 wrote to memory of 1184 452 datafli.exe datafli.exe PID 452 wrote to memory of 1184 452 datafli.exe datafli.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe"C:\Users\Admin\AppData\Local\Temp\07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe"C:\Users\Admin\AppData\Local\Temp\07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JFESI.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe" /f4⤵
- Adds Run key to start application
PID:216 -
C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:452 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- Suspicious use of SetWindowsHookEx
PID:856 -
C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\07374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba.exe
Filesize128KB
MD529a091e765d47bfbaef72a032610bb00
SHA1a2617dce73d769f191781a9fbc4bd4e5afab1f46
SHA25607374284c7ce5a21453d3a8c513d5d817d748e1a2fc29981b1220aa8185a2bba
SHA512ddf73d7da051c29841fac251d9a9d41d4c0d389b69d6cd313352f92cf043d420614aa18041b65b859f3e7d00daabe02649ab3f0cee560c6d8bf761f16bda4f3d
-
Filesize
148B
MD5cad4294c9f78a2359f70ea09f0f56325
SHA11d02ee76821a5b6fe45aa4f12bac8f86b0043691
SHA25648eb38071c5a2a5c40b3110fcbcb52f6ad0849c3ec20b1cf1be5fa223ac0aaf4
SHA512cd62dd9423a3224d2c4d27853554e0574212cf48a824d562ab3e17231bb839f1dadb12067a7ca39c0cf8ddd5b0e3e8c1dbf601f9822567957e7c29e51fe1693d
-
Filesize
128KB
MD5dce2e40b7ee91ce095e1c64ce9df3e74
SHA1c4eb3fc41fbcf00bd4a5e72976570209e5c33d2c
SHA2566eb5f672cb3e0721d6f098c41fb33aabb27b97cf09429e6d50c57d7dba01e0b8
SHA51248f18f79fec3c5591dc1c5428ccddf36201e42fb92457a7a71bb2b5bbeadc329a239c15967a2eaba495d8a3eb75d9656ce13751f5fe44702c7e8b32b757dfd2f