Analysis
-
max time kernel
131s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30/05/2024, 18:08
Static task
static1
Behavioral task
behavioral1
Sample
01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e.exe
Resource
win10v2004-20240508-en
General
-
Target
01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e.exe
-
Size
12KB
-
MD5
899ce74b2c00a1fb34f9f2708610ebea
-
SHA1
b255de9d773b5bdfcadfcc07542371ccba4d50c4
-
SHA256
01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e
-
SHA512
68b5124d356a4f1d233ba7b6a39b20a59d9d7420acfe08a5811053432ce902f940cc668fa624d0d7e9997f920410f197f1f43710085c65f4496544aabbc46081
-
SSDEEP
384:cL7li/2zCq2DcEQvdQcJKLTp/NK9xaO7:6yMCQ9cO7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000\Control Panel\International\Geo\Nation 01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e.exe -
Deletes itself 1 IoCs
pid Process 5004 tmp785D.tmp.exe -
Executes dropped EXE 1 IoCs
pid Process 5004 tmp785D.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4532 01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4532 wrote to memory of 5076 4532 01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e.exe 87 PID 4532 wrote to memory of 5076 4532 01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e.exe 87 PID 4532 wrote to memory of 5076 4532 01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e.exe 87 PID 5076 wrote to memory of 4416 5076 vbc.exe 89 PID 5076 wrote to memory of 4416 5076 vbc.exe 89 PID 5076 wrote to memory of 4416 5076 vbc.exe 89 PID 4532 wrote to memory of 5004 4532 01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e.exe 90 PID 4532 wrote to memory of 5004 4532 01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e.exe 90 PID 4532 wrote to memory of 5004 4532 01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e.exe"C:\Users\Admin\AppData\Local\Temp\01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\xbulbpdz\xbulbpdz.cmdline"2⤵
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES7A50.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc13D3E2345DB4EB09123F732C920F918.TMP"3⤵PID:4416
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp785D.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp785D.tmp.exe" C:\Users\Admin\AppData\Local\Temp\01deefb0edfd41cbdf3934f44ddbd597862dfc1954553c1400a5cc9416b11a6e.exe2⤵
- Deletes itself
- Executes dropped EXE
PID:5004
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5f19f5ce9c87c70da42142ed0b679042b
SHA1e45cc034e49bad4d5ab4c224136f91bd4e7e68f9
SHA256f52ca886b0683401e9e64c379f0a951c615ed5feedecc7f92088b7d5e08cc139
SHA5125e87d087a4d1c8591107c58d93d47ec79d3221622ca48011204259c020f1b08d61e799014f87f7cc218d0b5fd9cb5128da93d04ddd3f3c7d04ad9c695a743a18
-
Filesize
1KB
MD57b8668223844b23d4b39a09d629743ef
SHA1fe9e986cc8c242d3a45dd8f4f87a1089279afc89
SHA256ce96f7add2df1f72200c3ac9e2bb482512998f01a4b151c514783fe6f83a05a1
SHA5128b9f9223f3f58b7dff1129d69fcc5c91e1ca3cb4f04c1dab2a999f928bc09120a9e9cf1ce21ba9d347790a3546336f1659abcc10f2d60001056e5aca87ebcd63
-
Filesize
12KB
MD5dca4bfb4f2bd631de23d751af16de167
SHA1ce1e555dec4f70af273ff146a3d5a50f77564d22
SHA25682e92a262da2509dc115d75a044a6826ccd045c29e1be763427c03b30613eaf7
SHA5126d6f8e91a76d03e75f82bd7fef4d28403052242eee1faeebac9f0618d78b6a478531c12acee0d479166373ade5f370ac48749e0399ea76405de17ba00a224a08
-
Filesize
1KB
MD5bddba4c0d7b1f66b1b4d8d26ca94d307
SHA1dc2980428cbce38c1a303551435050a0f252550b
SHA25607daeed0ed66cea582f0e3f96b16a52d586626b86660a3e6f04c612b9149a9bb
SHA512251400dc7e0e18e6d21029e98c9154add8c90d1c67971ff185f0ce99e4429f97a21f799fcea20cff2ca30e0be1f18e43e73ad80edbbfbc4d57c39bee7b0cdd17
-
Filesize
2KB
MD514cf0578bdd5ab16e00aa9431b9c6145
SHA1aaf1a6a727cbece21ea6c278a76c06d9ec74a769
SHA2562fa3f44b89dfa38717126180b73ae6a75cfd001b21dfb4b4e68caa0a366823ba
SHA5126e639029e304ca696c5c168b8c770b1b2477b0b36f40925c01b8c2e91f6ccbd22ae0c412364f46a2c41b6f5cd9cf559732a695f188a1dfb3a6b358946dc4cc43
-
Filesize
273B
MD541847aa39a5c6a9ae4348af92fa56347
SHA1f3a0d8640534a50b544ae0a32754abd4930206cc
SHA256f9308d1edea429d422e2179ae8c9a23df0b2bae2363da53e95531990426e5afa
SHA51242b4b4c9e565c99a13c4765d9c60c9c12ae343546594376e0bdede2645afa44846a091c05df7929f2a16d50be2f40e113122bf3054a668a1dce505ec6fd57d1c