Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12/07/2024, 04:57
Behavioral task
behavioral1
Sample
343c4ee767bd93c60cbe2bcb809c8590N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
343c4ee767bd93c60cbe2bcb809c8590N.exe
Resource
win10v2004-20240709-en
General
-
Target
343c4ee767bd93c60cbe2bcb809c8590N.exe
-
Size
134KB
-
MD5
343c4ee767bd93c60cbe2bcb809c8590
-
SHA1
0587ad811293396d48981b52f2a70e9c5b933ab1
-
SHA256
fbbee6d4a07ab6c42d1ae865593ae7c5ef7dadda634371d5e05277c48a9ddd36
-
SHA512
328f11183f2cebd2c0ebbb8ef18c03f7c883ae6c78659d2a442ab9e2ae6223de464f87eafa195749638fe83ed699fe1caf055a16f996036a09b7d6fe1590d48f
-
SSDEEP
1536:YGYU/W2/HG6QMauSV3ixJHABLrmhH7i9eNOOg00GqMIK7aGZh3SOx:YfU/WF6QMauSuiWNi9eNOl0007NZIOx
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-701583114-2636601053-947405450-1000\Control Panel\International\Geo\Nation 343c4ee767bd93c60cbe2bcb809c8590N.exe -
Executes dropped EXE 1 IoCs
pid Process 2380 wuauclt.exe -
resource yara_rule behavioral2/memory/4640-0-0x00000000003E0000-0x0000000000408000-memory.dmp upx behavioral2/files/0x000a000000023442-3.dat upx behavioral2/memory/2380-5-0x0000000000230000-0x0000000000258000-memory.dmp upx behavioral2/memory/4640-6-0x00000000003E0000-0x0000000000408000-memory.dmp upx behavioral2/memory/4640-7-0x00000000003E0000-0x0000000000408000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Window Update = "\"C:\\ProgramData\\Update\\wuauclt.exe\" /run" 343c4ee767bd93c60cbe2bcb809c8590N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4640 wrote to memory of 2380 4640 343c4ee767bd93c60cbe2bcb809c8590N.exe 84 PID 4640 wrote to memory of 2380 4640 343c4ee767bd93c60cbe2bcb809c8590N.exe 84 PID 4640 wrote to memory of 2380 4640 343c4ee767bd93c60cbe2bcb809c8590N.exe 84 PID 4640 wrote to memory of 4020 4640 343c4ee767bd93c60cbe2bcb809c8590N.exe 89 PID 4640 wrote to memory of 4020 4640 343c4ee767bd93c60cbe2bcb809c8590N.exe 89 PID 4640 wrote to memory of 4020 4640 343c4ee767bd93c60cbe2bcb809c8590N.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\343c4ee767bd93c60cbe2bcb809c8590N.exe"C:\Users\Admin\AppData\Local\Temp\343c4ee767bd93c60cbe2bcb809c8590N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\ProgramData\Update\wuauclt.exe"C:\ProgramData\Update\wuauclt.exe" /run2⤵
- Executes dropped EXE
PID:2380
-
-
C:\windows\SysWOW64\cmd.exe"C:\windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\343c4ee767bd93c60cbe2bcb809c8590N.exe" >> NUL2⤵PID:4020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
134KB
MD5fc897f68d7411df256b2d0214cbe6c8c
SHA13927473a986881b07f712313f1b5fb25954cedaf
SHA256c662516bac1658676e7398ccca294d60d03e2201c0668516a883f2f133099b04
SHA512a90c142d3b291e6ed0e8de9d975a2533102f5a8d1f4dd4cdc740d669f2271e2fc8365d43620af8bfd07b6b32987cc86ddd5d678c93415f6733afe767e8ec29b7