Analysis
-
max time kernel
120s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
2da71a8bc8d4bd13349641d9864e21d0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2da71a8bc8d4bd13349641d9864e21d0N.exe
Resource
win10v2004-20240709-en
General
-
Target
2da71a8bc8d4bd13349641d9864e21d0N.exe
-
Size
31KB
-
MD5
2da71a8bc8d4bd13349641d9864e21d0
-
SHA1
c40e89cc52aee8167a0db7ac0e3977bbf677db68
-
SHA256
d02b238c7e0fd6a45a0a0739fee2a527e89e4154bce704baab534f051d8a196b
-
SHA512
5c7593890d3d61a2ac11bf7d908174d216f75c853c059a0a0f52f793227749e12413eadb9424751140240169d8a8b8c37b5d507446a149302d3657e593a998d5
-
SSDEEP
768:9lneDDzFOeS7mjGU8zHTHXzXHCzcsHizTxavc:9lnEHdjGU4j5j0vc
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 2da71a8bc8d4bd13349641d9864e21d0N.exe Set value (int) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Admin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\Control Panel\International\Geo\Nation 2da71a8bc8d4bd13349641d9864e21d0N.exe -
Executes dropped EXE 1 IoCs
pid Process 4980 Admin.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" 2da71a8bc8d4bd13349641d9864e21d0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Admin = "C:\\Users\\Admin\\Admin.exe" Admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 4980 Admin.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4980 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 87 PID 4920 wrote to memory of 4980 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 87 PID 4920 wrote to memory of 4980 4920 2da71a8bc8d4bd13349641d9864e21d0N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\2da71a8bc8d4bd13349641d9864e21d0N.exe"C:\Users\Admin\AppData\Local\Temp\2da71a8bc8d4bd13349641d9864e21d0N.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\Admin.exe"C:\Users\Admin\Admin.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4980
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5d713f68039330a01ca19a5235423cba2
SHA11e9c8c69d27528807c36a02b77a0c87ea5126ed1
SHA2569db4e9c28507a48087c8527047b0c7f15f8596e15cab84ddcfb00808213d2207
SHA512530693f318ad8dae6501d4f60d1627ed8c8d511367b071b8db4822f97ba2fe54f739bebea8c0bfc1453e725b81ad4cb74887cf373757bb78723a9172ff593991