Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
29-06-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
3e5069922731d5e61614684f16fcd1625a1f02e5011a809acd2066071900e8b4.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
3e5069922731d5e61614684f16fcd1625a1f02e5011a809acd2066071900e8b4.exe
Resource
win10v2004-20240508-en
General
-
Target
3e5069922731d5e61614684f16fcd1625a1f02e5011a809acd2066071900e8b4.exe
-
Size
1.4MB
-
MD5
633a8069e3b232bcc9f800cfc5f12ac3
-
SHA1
09ca4984514bed5f8d8ba54ba64497b793022a3e
-
SHA256
3e5069922731d5e61614684f16fcd1625a1f02e5011a809acd2066071900e8b4
-
SHA512
4dc53d2503718f310a2b43f3f57cd0b8164ae47533ca95f65a42f12c6c0984d9d8bba71e994d2eb65697a6638b84f4af657d1d9a91213a12c7b273476d16af2a
-
SSDEEP
24576:CZkcYXyNjbvkEhkmWbay5h1XYQOQQ5rtwD24BXcO9hbj0d:CZksjbJkmu1XYn7/wyVebj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 3e5069922731d5e61614684f16fcd1625a1f02e5011a809acd2066071900e8b4.exe -
Executes dropped EXE 2 IoCs
pid Process 2716 scegli_nome.exe 3984 scegli_nome.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\scegli_nome.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2716 set thread context of 3984 2716 scegli_nome.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 1 IoCs
pid Process 2788 reg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3984 scegli_nome.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3860 wrote to memory of 2788 3860 3e5069922731d5e61614684f16fcd1625a1f02e5011a809acd2066071900e8b4.exe 81 PID 3860 wrote to memory of 2788 3860 3e5069922731d5e61614684f16fcd1625a1f02e5011a809acd2066071900e8b4.exe 81 PID 3860 wrote to memory of 2788 3860 3e5069922731d5e61614684f16fcd1625a1f02e5011a809acd2066071900e8b4.exe 81 PID 3860 wrote to memory of 2716 3860 3e5069922731d5e61614684f16fcd1625a1f02e5011a809acd2066071900e8b4.exe 83 PID 3860 wrote to memory of 2716 3860 3e5069922731d5e61614684f16fcd1625a1f02e5011a809acd2066071900e8b4.exe 83 PID 3860 wrote to memory of 2716 3860 3e5069922731d5e61614684f16fcd1625a1f02e5011a809acd2066071900e8b4.exe 83 PID 2716 wrote to memory of 3984 2716 scegli_nome.exe 84 PID 2716 wrote to memory of 3984 2716 scegli_nome.exe 84 PID 2716 wrote to memory of 3984 2716 scegli_nome.exe 84 PID 2716 wrote to memory of 3984 2716 scegli_nome.exe 84 PID 2716 wrote to memory of 3984 2716 scegli_nome.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e5069922731d5e61614684f16fcd1625a1f02e5011a809acd2066071900e8b4.exe"C:\Users\Admin\AppData\Local\Temp\3e5069922731d5e61614684f16fcd1625a1f02e5011a809acd2066071900e8b4.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\scegli_nome.exe" /f2⤵
- Adds Run key to start application
- Modifies registry key
PID:2788
-
-
C:\Users\Admin\AppData\Roaming\scegli_nome.exe"C:\Users\Admin\AppData\Roaming\scegli_nome.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Roaming\scegli_nome.exe"C:\Users\Admin\AppData\Roaming\scegli_nome.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3984
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.4MB
MD593a627f71e0490022c44f57876e66d13
SHA12b4b8d45c3badc650b1279457c71fa0ea50ce625
SHA2563bdb00ded770187e0f1c47a5a8dd88f3877469c0a835496e952d8a662a30c61f
SHA51241f31d912dd667fbe1e1876dde0c4c49d6253b87c5d130d7906d75696a1a81c11b18e45d5a65ae8d88d3f92ea1fd7853ace399daca5a6f6f1c4c4bd817cfb503