Analysis
-
max time kernel
131s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
03-06-2024 01:52
Behavioral task
behavioral1
Sample
9b18532674a9282289f8be8357460eb4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9b18532674a9282289f8be8357460eb4.exe
Resource
win10v2004-20240508-en
General
-
Target
9b18532674a9282289f8be8357460eb4.exe
-
Size
105.0MB
-
MD5
9b18532674a9282289f8be8357460eb4
-
SHA1
3ab80df6fd12ee818b0efa62547a255689b56b89
-
SHA256
37e5d18fe89aa21253fc6b82f73ca1938b4f86f63a4c6686ff85471d6d88a082
-
SHA512
f0c99375a23c72573d8d74fa8acfc27b2dc690579fac4ee919c72a14e043bb0b7ab9295c937d36064c7a80a69c1a64d7af13dc750cf70af4fdba4ca60f527c0d
-
SSDEEP
1572864:gDJaiqXk6kYbEzJI7TWYiLWuPX9prFxCr8wkhXGeC37spBnwjWfm2Tivq:Ab9YbEVQqLWuPXD+r/khXGezBnaW+vq
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
9b18532674a9282289f8be8357460eb4.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 9b18532674a9282289f8be8357460eb4.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral2/memory/3076-1-0x00000000001D0000-0x00000000011D0000-memory.dmp agile_net -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4860 3076 WerFault.exe 9b18532674a9282289f8be8357460eb4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
9b18532674a9282289f8be8357460eb4.exedescription pid process Token: SeDebugPrivilege 3076 9b18532674a9282289f8be8357460eb4.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b18532674a9282289f8be8357460eb4.exe"C:\Users\Admin\AppData\Local\Temp\9b18532674a9282289f8be8357460eb4.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:3076 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3076 -s 21922⤵
- Program crash
PID:4860
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3076 -ip 30761⤵PID:4644
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3076-0-0x000000007524E000-0x000000007524F000-memory.dmpFilesize
4KB
-
memory/3076-1-0x00000000001D0000-0x00000000011D0000-memory.dmpFilesize
16.0MB
-
memory/3076-2-0x000000000B4A0000-0x000000000B506000-memory.dmpFilesize
408KB
-
memory/3076-3-0x0000000075240000-0x00000000759F0000-memory.dmpFilesize
7.7MB
-
memory/3076-4-0x00000000300D0000-0x00000000310D0000-memory.dmpFilesize
16.0MB
-
memory/3076-5-0x0000000008DC0000-0x0000000008DE6000-memory.dmpFilesize
152KB
-
memory/3076-6-0x0000000012CE0000-0x0000000012D56000-memory.dmpFilesize
472KB
-
memory/3076-7-0x000000000C330000-0x000000000C33A000-memory.dmpFilesize
40KB
-
memory/3076-8-0x000000000C4B0000-0x000000000C4CE000-memory.dmpFilesize
120KB
-
memory/3076-18-0x0000000075240000-0x00000000759F0000-memory.dmpFilesize
7.7MB