Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 21:59
Static task
static1
Behavioral task
behavioral1
Sample
8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe
Resource
win10v2004-20240704-en
General
-
Target
8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe
-
Size
4.8MB
-
MD5
ac00a9a9fead5378f8072ac3350571a7
-
SHA1
5cca77c5ce97e4bcbf384208d7bd079972fe4740
-
SHA256
8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625
-
SHA512
38ac35cfd98ffb56010167cb9f3f885b2f431d7c7da07c513e75ebacb8dfbf17c73578fb1e9d939e45634cd51adc09aeaf82813abfba2ae7d266ff437d092d66
-
SSDEEP
98304:utiuhXuhmF1OgPptZDElaxQ3PCTDsRnLPYSz7Iy:QkktIa6n3Iy
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation 8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe -
Executes dropped EXE 2 IoCs
pid Process 2704 ITS SB App Switch.exe 4640 ITS SB App Switch.exe -
Loads dropped DLL 1 IoCs
pid Process 3200 8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ITS SB App Switch.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3200 8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe 3200 8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe 3200 8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe 3200 8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4640 ITS SB App Switch.exe 4640 ITS SB App Switch.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3200 wrote to memory of 2704 3200 8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe 84 PID 3200 wrote to memory of 2704 3200 8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe 84 PID 3200 wrote to memory of 2704 3200 8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe 84 PID 3200 wrote to memory of 4640 3200 8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe 86 PID 3200 wrote to memory of 4640 3200 8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe 86 PID 3200 wrote to memory of 4640 3200 8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe"C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625.exe"1⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625\ITS SB App Switch.exe"C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625\ITS SB App Switch.exe"2⤵
- Executes dropped EXE
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625\ITS SB App Switch.exe"C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625\ITS SB App Switch.exe" 32002⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4640
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625\ITS SB App Switch.exe
Filesize370KB
MD56e3b18cac5d61c109906e94ce895d2bc
SHA1557d63dd72dc47e9b2d701c40e80fba1e108e9c5
SHA256db70869cfafb8877fd02beb9d970427e6103c1003d04eca2dad1ac9a9587d489
SHA512e27d2cf4e63b414b7a8e89c48e9b4c0ccb93e52c2405e9b5bbac13352daa3cf9e619b48845547ebdbfaa7ef8af850f1c3fe4b8ac228dfa3d14095d86cf82340b
-
C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625\TestSecurity.12.7.0.249.dll
Filesize1.6MB
MD5a7d19e10c06f0b71f69c15e0c070f66a
SHA111a10b61e3925125b963e3074dea63f36084da23
SHA2566b766ffee9ee5ebeee3830a90870afca99a79e7611fd81f2e4afab009513a3dc
SHA51209cc5eff3529881d540ac96cf5fe488dc843d131d7c4527b2dbc4349c048a1cd2d1f190365f174d5972624805d07b84d513aa274144bd2974ced2ec57e2ed758
-
C:\Users\Admin\AppData\Local\Temp\8bb60929a36b71a69acb94f16139f428734b2c6dc8bb2fdc5abf7b65626f0625\spinner.gif
Filesize14KB
MD5a98a798d1bb6ad80560e4811d07ffbb5
SHA14e985d0366fa06beb628f1620edf32d592312e90
SHA256dafcf9bbf9dcbd6ef0c3281a9cf739e115ef8934e6d711ca130a4d4eed19fb6e
SHA512a0a00c29f5fedf21bad7e49f3016353ce19e9a6501bc31d9cdc22e517504b2bbf43f86def6a5815276cbd4c213414a86bb0ea96ecbc1c6249d67b6de90e5798f