Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25/07/2024, 11:57
Behavioral task
behavioral1
Sample
ce03c8cf40becfbbface398c63b09240N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ce03c8cf40becfbbface398c63b09240N.exe
Resource
win10v2004-20240709-en
General
-
Target
ce03c8cf40becfbbface398c63b09240N.exe
-
Size
59KB
-
MD5
ce03c8cf40becfbbface398c63b09240
-
SHA1
ac059776fff7c80677f922e4554b9230590f233c
-
SHA256
b93cab63961adeed176eb6e2fd8ec91bad4b50a079145ed53f59226436421401
-
SHA512
7f8d658e2f7182dbc8b8cd3c191382df1d13350af864ec33a373a71f3d7ec8693a98e3b0b32ed65f54c841ada07815559d3db92a0f79420c0845819dae6fe92f
-
SSDEEP
1536:3+ZgwRdiE8cO4p1xRjfTvSq5r3ZiIZ4nouy8uh1aQ6:OeodiUO4p13b9HiIeoutuh1aQ6
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2990742725-2267136959-192470804-1000\Control Panel\International\Geo\Nation ce03c8cf40becfbbface398c63b09240N.exe -
Executes dropped EXE 1 IoCs
pid Process 4372 AhnSvc.exe -
resource yara_rule behavioral2/memory/1152-0-0x0000000000C20000-0x0000000000C47000-memory.dmp upx behavioral2/files/0x00080000000234cf-3.dat upx behavioral2/memory/4372-5-0x00000000007D0000-0x00000000007F7000-memory.dmp upx behavioral2/memory/1152-8-0x0000000000C20000-0x0000000000C47000-memory.dmp upx behavioral2/memory/4372-9-0x00000000007D0000-0x00000000007F7000-memory.dmp upx behavioral2/memory/4372-10-0x00000000007D0000-0x00000000007F7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AhnUpadate = "\"C:\\ProgramData\\AhnLab\\AhnSvc.exe\" /run" ce03c8cf40becfbbface398c63b09240N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce03c8cf40becfbbface398c63b09240N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AhnSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1152 ce03c8cf40becfbbface398c63b09240N.exe Token: SeDebugPrivilege 4372 AhnSvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1152 wrote to memory of 4372 1152 ce03c8cf40becfbbface398c63b09240N.exe 84 PID 1152 wrote to memory of 4372 1152 ce03c8cf40becfbbface398c63b09240N.exe 84 PID 1152 wrote to memory of 4372 1152 ce03c8cf40becfbbface398c63b09240N.exe 84 PID 1152 wrote to memory of 4556 1152 ce03c8cf40becfbbface398c63b09240N.exe 85 PID 1152 wrote to memory of 4556 1152 ce03c8cf40becfbbface398c63b09240N.exe 85 PID 1152 wrote to memory of 4556 1152 ce03c8cf40becfbbface398c63b09240N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce03c8cf40becfbbface398c63b09240N.exe"C:\Users\Admin\AppData\Local\Temp\ce03c8cf40becfbbface398c63b09240N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\ProgramData\AhnLab\AhnSvc.exe"C:\ProgramData\AhnLab\AhnSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4372
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\ce03c8cf40becfbbface398c63b09240N.exe" >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:4556
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5337db44f67cf2baa3ae0f7babfd75078
SHA17da3f34bfff10620cf5ff7a312d1a155aeed3844
SHA256e6f6ce3d43000d22b3319c7898d3076048bdc3a0f2a35f17887a7faf67fd0eec
SHA5125ba4ad71b83704f83bf75ab2c96459344ecda1bead06cc6f090b11d0f33e0d4061c4c0fe5acb51d53c148ca764edf990f401a1a45172993567e72fd87c5080e2