Analysis
-
max time kernel
149s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27-05-2024 21:43
Static task
static1
Behavioral task
behavioral1
Sample
463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe
Resource
win10v2004-20240508-en
General
-
Target
463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe
-
Size
179KB
-
MD5
44c14ebd1dd51d4f7de8e9badb6b6da9
-
SHA1
1edb8eb6776c140b50a751624afc028f9d45692e
-
SHA256
463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91
-
SHA512
a6e1b5d638d2beaaa0bddfbc117de1b93263f9249b9cffd4edb4e91b079d6d6f3a3d1625a6deff655684ec89a531e9dc64349a018e8330e4b2a65125d258406d
-
SSDEEP
3072:0XTTASJKf2n5AxE2NpxOa2XdU2QF4s5XgIDFyHb8kHofL/09rGB:0vASJKenie2xT2NU2OTFQb8Fb0IB
Malware Config
Signatures
-
Detects executables packed with aPLib. 2 IoCs
resource yara_rule behavioral2/memory/2528-0-0x0000000000D90000-0x0000000000DC0000-memory.dmp INDICATOR_EXE_Packed_aPLib behavioral2/memory/2528-361-0x0000000000D90000-0x0000000000DC0000-memory.dmp INDICATOR_EXE_Packed_aPLib -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent8 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\B62480~1.EXE" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Eset\Nod svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2528 set thread context of 4452 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe 4452 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2528 wrote to memory of 4452 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 83 PID 2528 wrote to memory of 4452 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 83 PID 2528 wrote to memory of 4452 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 83 PID 2528 wrote to memory of 4452 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 83 PID 2528 wrote to memory of 4452 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 83 PID 2528 wrote to memory of 4452 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 83 PID 2528 wrote to memory of 4452 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 83 PID 2528 wrote to memory of 4452 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 83 PID 2528 wrote to memory of 4452 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 83 PID 2528 wrote to memory of 4452 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 83 PID 2528 wrote to memory of 4452 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 83 PID 4452 wrote to memory of 2528 4452 svchost.exe 82 PID 4452 wrote to memory of 2528 4452 svchost.exe 82 PID 4452 wrote to memory of 2528 4452 svchost.exe 82 PID 4452 wrote to memory of 2528 4452 svchost.exe 82 PID 4452 wrote to memory of 2528 4452 svchost.exe 82 PID 4452 wrote to memory of 2528 4452 svchost.exe 82 PID 4452 wrote to memory of 2528 4452 svchost.exe 82 PID 2528 wrote to memory of 1128 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 84 PID 2528 wrote to memory of 1128 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 84 PID 2528 wrote to memory of 1128 2528 463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe"C:\Users\Admin\AppData\Local\Temp\463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\b6248002jj.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\vucE638.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\463adce581ea9fe12fe1c9d2d8c8dedf82e2457f47f276017b5596741f53ea91.exe""2⤵PID:1128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28B
MD50d2ab670219d6691d9c3a430abe69fd3
SHA1744e06dfcfab05bec1255a2485188c079b69b67b
SHA25673bb3981e45263a51c8af91df81ee5b52d2f2777b0bb6e489bcab1a105bd0abe
SHA512aeebbb9ad747a0dd0857a0edd754294a36c6082cbbd8e04920ccc2d36ed2a70c952bd4101500626ae5459faad37098186aee0ca2db83feb841c7a5e7fccafa0f