Analysis
-
max time kernel
146s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 20:09
Behavioral task
behavioral1
Sample
Device/HarddiskVolume3/Fiserv/ImageCopy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Device/HarddiskVolume3/Fiserv/ImageCopy.exe
Resource
win10v2004-20240508-en
General
-
Target
Device/HarddiskVolume3/Fiserv/ImageCopy.exe
-
Size
28KB
-
MD5
36d5b2653df91578cd982cb66bcccf8d
-
SHA1
29b9a4b8ae82368b76adf0faa3547afb297ff378
-
SHA256
4f23f13092f5838c054b4670ced88f785730c803b3a546762925c15f62a73958
-
SHA512
282df27df0674e97ab0b428bedd870147334292cfc1e86cb2dcb0f12b69aa8ec0db276ecd348c1cc8380179d4aa67f9e17b0577182d1491c6d8c30c5eee1ced1
-
SSDEEP
768:wRGuY2P0Vo6r7SiAwyrMRjbyUs1KJu4xlrggInbcuyD7UB:OPcVo6r7S/rab/zEkpg7nouy8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
ImageCopy.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ImageCopy.exe -
Processes:
resource yara_rule behavioral2/memory/216-0-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral2/memory/216-7-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
xcopy.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ImageCopy.execmd.exedescription pid process target process PID 216 wrote to memory of 1840 216 ImageCopy.exe cmd.exe PID 216 wrote to memory of 1840 216 ImageCopy.exe cmd.exe PID 216 wrote to memory of 1840 216 ImageCopy.exe cmd.exe PID 1840 wrote to memory of 2856 1840 cmd.exe xcopy.exe PID 1840 wrote to memory of 2856 1840 cmd.exe xcopy.exe PID 1840 wrote to memory of 2856 1840 cmd.exe xcopy.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Fiserv\ImageCopy.exe"C:\Users\Admin\AppData\Local\Temp\Device\HarddiskVolume3\Fiserv\ImageCopy.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\53DD.tmp\ImageCopy.cmd" "2⤵
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\xcopy.exeXCOPY SampleImage.tif "C:\Users\Admin\AppData\Roaming\Fiserv\Alternatiff" /Y3⤵
- Enumerates system info in registry
PID:2856
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116B
MD533cbad841de1fa4137aec46e8626808b
SHA1b0dfa74096c6f15f366f555beee3f7d8b21d1f91
SHA256f12b9fda5c97cde1d4d1a254cf9ccee16d339270c95d0989da565695a6899abd
SHA51205c7b4e285b5652c02f9d0b2ed4f34431c1b86b8f65f07e60a3611941fb9316baa72b327ab302fb0ac5620dc93ef24624ce6edd382d6d86f7a0b2311453fa7a2