Analysis
-
max time kernel
134s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
05/06/2024, 05:16
Static task
static1
Behavioral task
behavioral1
Sample
ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe
Resource
win10v2004-20240508-en
General
-
Target
ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe
-
Size
1.2MB
-
MD5
77513dfacd68f73a828c692d383201b4
-
SHA1
1d0118d4d30b5ca2c2c63c94ee32681407edf2a5
-
SHA256
ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a
-
SHA512
67bb0262ab3a75e83d3a3e1f63a92ae7b8842b4d279aef65ce1a5a058392f77c4ca3de825e4cd1868fd713fc02a3a0fce027700a5987027971f2b0bc783bef71
-
SSDEEP
24576:tsS5aEhYDqHjmC4nigB7EoLDMl3FYkYsoqb4HzP4eqR2c/Kv9dLUqoDHT:tVrR4FBQo637Yf9P4eSmvDI
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe -
Executes dropped EXE 1 IoCs
pid Process 1772 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 1772 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 1772 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1056 schtasks.exe -
Kills process with taskkill 1 IoCs
pid Process 4356 taskkill.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\ProgramData\{MXS8UUTY-DMPO-72DH-K847PYR809AQ}\ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe:Zone.Identifier ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe File opened for modification C:\ProgramData\{MXS8UUTY-DMPO-72DH-K847PYR809AQ}\ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe:Zone.Identifier ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 1772 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 1772 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4356 taskkill.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1772 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 86 PID 1732 wrote to memory of 1772 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 86 PID 1732 wrote to memory of 1772 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 86 PID 1732 wrote to memory of 1056 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 88 PID 1732 wrote to memory of 1056 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 88 PID 1732 wrote to memory of 1056 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 88 PID 1732 wrote to memory of 2136 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 90 PID 1732 wrote to memory of 2136 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 90 PID 1732 wrote to memory of 2136 1732 ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe 90 PID 2136 wrote to memory of 4356 2136 cmd.exe 92 PID 2136 wrote to memory of 4356 2136 cmd.exe 92 PID 2136 wrote to memory of 4356 2136 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe"C:\Users\Admin\AppData\Local\Temp\ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe"1⤵
- Checks computer location settings
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\ProgramData\{MXS8UUTY-DMPO-72DH-K847PYR809AQ}\ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe"C:\ProgramData\{MXS8UUTY-DMPO-72DH-K847PYR809AQ}\ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe"2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
PID:1772
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 15 /TN "Z2WWZ60HB1HERPYJR8" /TR "C:\ProgramData\{MXS8UUTY-DMPO-72DH-K847PYR809AQ}\ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe" /F2⤵
- Creates scheduled task(s)
PID:1056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c taskkill /im ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe /f & erase C:\Users\Admin\AppData\Local\Temp\ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\taskkill.exetaskkill /im ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe /f3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4356
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\{MXS8UUTY-DMPO-72DH-K847PYR809AQ}\ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a.exe
Filesize1.2MB
MD577513dfacd68f73a828c692d383201b4
SHA11d0118d4d30b5ca2c2c63c94ee32681407edf2a5
SHA256ee61b5eb8411b3859d96b49ed2fc1cad9d1eea949323317a89f1e422f716b33a
SHA51267bb0262ab3a75e83d3a3e1f63a92ae7b8842b4d279aef65ce1a5a058392f77c4ca3de825e4cd1868fd713fc02a3a0fce027700a5987027971f2b0bc783bef71