Analysis
-
max time kernel
141s -
max time network
131s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
07-07-2024 03:07
Static task
static1
Behavioral task
behavioral1
Sample
38314d28d4eeb8ab2ed5057667a447f0N.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
38314d28d4eeb8ab2ed5057667a447f0N.exe
Resource
win10v2004-20240704-en
General
-
Target
38314d28d4eeb8ab2ed5057667a447f0N.exe
-
Size
83KB
-
MD5
38314d28d4eeb8ab2ed5057667a447f0
-
SHA1
963945cc2284baf6eaf7dcef3569ee5e7dbe5c0d
-
SHA256
2abf4585447d890632eb761ffc2dd7fe8ca98df116890017bf9f90adcd848b29
-
SHA512
30d9ea466f63a6f6a2030b3047cae3d8b09b9a8ab487d5a345656c1f76be7233ea0a3e9c271300615d539c69402f58555510d6741fedb88d609a355f5d2be8ee
-
SSDEEP
1536:lvQoLHjw2iWPKMvw71sMLyXuyoXXXxXXXLIIIgDYTSsgCj1UUZBALAHHHn:lv5Ls27BIJsMLyXuyoXXXxXXXLIIIRmg
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-587429654-1855694383-2268796072-1000\Control Panel\International\Geo\Nation 38314d28d4eeb8ab2ed5057667a447f0N.exe -
Executes dropped EXE 1 IoCs
pid Process 2872 vgkhost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\vgkhost.exe 38314d28d4eeb8ab2ed5057667a447f0N.exe File opened for modification C:\Windows\Debug\vgkhost.exe 38314d28d4eeb8ab2ed5057667a447f0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz vgkhost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vgkhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4100 38314d28d4eeb8ab2ed5057667a447f0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4100 wrote to memory of 3004 4100 38314d28d4eeb8ab2ed5057667a447f0N.exe 86 PID 4100 wrote to memory of 3004 4100 38314d28d4eeb8ab2ed5057667a447f0N.exe 86 PID 4100 wrote to memory of 3004 4100 38314d28d4eeb8ab2ed5057667a447f0N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\38314d28d4eeb8ab2ed5057667a447f0N.exe"C:\Users\Admin\AppData\Local\Temp\38314d28d4eeb8ab2ed5057667a447f0N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\38314D~1.EXE > nul2⤵PID:3004
-
-
C:\Windows\Debug\vgkhost.exeC:\Windows\Debug\vgkhost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2872
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD56d39f7a18e00af2c482f660dcd796ae6
SHA1aedc2f9c623c2a4c241c41abfd3d78210c7ce285
SHA256985dd8bca82e19913750a1320bd0521492961af67a4604ba4859d8144a0c285f
SHA512a1ddbadcb05000ff2c569b9b1336dfe93a71f65342e3c2201b9a81e66b77d6234f09b81663fd769ef0c96ba634807db723682d16d490efce99509f9ec37b0960