Analysis
-
max time kernel
19s -
max time network
19s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 17:06
Static task
static1
Behavioral task
behavioral1
Sample
ASLSv1.0.2.zip
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ASLSv1.0.2.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
Alex's lagswitch/Alex's lagswitch.exe
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
Alex's lagswitch/Alex's lagswitch.exe
Resource
win10v2004-20240709-en
General
-
Target
Alex's lagswitch/Alex's lagswitch.exe
-
Size
9KB
-
MD5
3ae6c0e3502443ada2366f33917b9dfb
-
SHA1
f0a8f7ce06cb4f26c6576219cf4256d89ff7f86f
-
SHA256
6a9cf1535b65e949817ff9e7aad81e25cab98b8f4d202e3766153c67150821a2
-
SHA512
b1792d32aa49ce7a4abc83aafa093904f8ff0a92f947643b94c667b11130dfaffc121ef14ff3872bb05d5550543ad4648da329eb5bb0765298f474a1ad576030
-
SSDEEP
192:aJzLLqhwaN/4eFVbojV5McsoOQHR/i9f0tj:a6h4eFVbgMcsoOQHR/CfO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation Alex's lagswitch.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Gathers network information 2 TTPs 5 IoCs
Uses commandline utility to view network configuration.
pid Process 4204 ipconfig.exe 640 ipconfig.exe 2332 ipconfig.exe 2980 ipconfig.exe 5064 ipconfig.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2676 wrote to memory of 712 2676 Alex's lagswitch.exe 87 PID 2676 wrote to memory of 712 2676 Alex's lagswitch.exe 87 PID 2676 wrote to memory of 712 2676 Alex's lagswitch.exe 87 PID 712 wrote to memory of 2980 712 cmd.exe 89 PID 712 wrote to memory of 2980 712 cmd.exe 89 PID 712 wrote to memory of 2980 712 cmd.exe 89 PID 2676 wrote to memory of 1052 2676 Alex's lagswitch.exe 90 PID 2676 wrote to memory of 1052 2676 Alex's lagswitch.exe 90 PID 2676 wrote to memory of 1052 2676 Alex's lagswitch.exe 90 PID 1052 wrote to memory of 5064 1052 cmd.exe 92 PID 1052 wrote to memory of 5064 1052 cmd.exe 92 PID 1052 wrote to memory of 5064 1052 cmd.exe 92 PID 2676 wrote to memory of 3216 2676 Alex's lagswitch.exe 93 PID 2676 wrote to memory of 3216 2676 Alex's lagswitch.exe 93 PID 2676 wrote to memory of 3216 2676 Alex's lagswitch.exe 93 PID 3216 wrote to memory of 4204 3216 cmd.exe 95 PID 3216 wrote to memory of 4204 3216 cmd.exe 95 PID 3216 wrote to memory of 4204 3216 cmd.exe 95 PID 2676 wrote to memory of 4376 2676 Alex's lagswitch.exe 96 PID 2676 wrote to memory of 4376 2676 Alex's lagswitch.exe 96 PID 2676 wrote to memory of 4376 2676 Alex's lagswitch.exe 96 PID 4376 wrote to memory of 640 4376 cmd.exe 98 PID 4376 wrote to memory of 640 4376 cmd.exe 98 PID 4376 wrote to memory of 640 4376 cmd.exe 98 PID 2676 wrote to memory of 3344 2676 Alex's lagswitch.exe 99 PID 2676 wrote to memory of 3344 2676 Alex's lagswitch.exe 99 PID 2676 wrote to memory of 3344 2676 Alex's lagswitch.exe 99 PID 3344 wrote to memory of 2332 3344 cmd.exe 101 PID 3344 wrote to memory of 2332 3344 cmd.exe 101 PID 3344 wrote to memory of 2332 3344 cmd.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\Alex's lagswitch\Alex's lagswitch.exe"C:\Users\Admin\AppData\Local\Temp\Alex's lagswitch\Alex's lagswitch.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:712 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:2980
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:5064
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:4204
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ipconfig /release2⤵
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /release3⤵
- Gathers network information
PID:640
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C ipconfig /renew2⤵
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /renew3⤵
- Gathers network information
PID:2332
-
-