Analysis
-
max time kernel
143s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
12/06/2024, 05:37
Static task
static1
Behavioral task
behavioral1
Sample
e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991.exe
Resource
win10v2004-20240508-en
General
-
Target
e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991.exe
-
Size
93KB
-
MD5
5b5b933d089656eeb400f7f74c5fb31b
-
SHA1
188c9c4a1669093e82c98904147c56679e81b796
-
SHA256
e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991
-
SHA512
0bacc2906c0058b3e4a7f706f1969389233f1f7eb42b3f6adf38b2e59aaa89582a6b1c375e73feba6b907622812f65db6471627828deb45ea6b244202aa0fafa
-
SSDEEP
1536:PGYU/W2/HG6QMauSV3ixJHABLrmhH7i9CO+WHg7zRZICrWaGZh7f:PfU/WF6QMauSuiWNi9CO+WARJrWNZx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991.exe -
Executes dropped EXE 1 IoCs
pid Process 3688 wuauclt.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4208 wrote to memory of 3688 4208 e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991.exe 90 PID 4208 wrote to memory of 3688 4208 e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991.exe 90 PID 4208 wrote to memory of 3688 4208 e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991.exe 90 PID 4208 wrote to memory of 1616 4208 e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991.exe 97 PID 4208 wrote to memory of 1616 4208 e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991.exe 97 PID 4208 wrote to memory of 1616 4208 e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991.exe"C:\Users\Admin\AppData\Local\Temp\e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
PID:3688
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\e2f7a3734f51e37273ce2a13c78b87a2a3f55f65a4627ba7a037e22c8708d991.exe" >> NUL2⤵PID:1616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=1320,i,17096020621006928097,15544233752327415349,262144 --variations-seed-version --mojo-platform-channel-handle=3240 /prefetch:81⤵PID:4860
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5a5073d2d5125e77fbd8b20cd8ef4e154
SHA19ce98048e227d68fba3194a358bf6d591f300a0c
SHA2562b0bc57f97669e8fc5803c3f0341aa60efaf9e3045adeb080f8e720f5227b4cb
SHA512dacc3c6d23176041449d94610739aef8ace593e79fd03ddc9050dec0e5cedc1ea5b333be407b1c37d4ed0add4df580b60e19c51302fa14d25714bc445a43ef4a