Analysis
-
max time kernel
120s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-08-2024 13:05
Static task
static1
Behavioral task
behavioral1
Sample
929f775f2fc187385758ca74613c2340N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
929f775f2fc187385758ca74613c2340N.exe
Resource
win10v2004-20240802-en
General
-
Target
929f775f2fc187385758ca74613c2340N.exe
-
Size
179KB
-
MD5
929f775f2fc187385758ca74613c2340
-
SHA1
37cfc1032389f42672ffe4dad730e96b5afa8ce8
-
SHA256
d910cca45030e1c5fc540eea2ef8d6b9d2cf7acc7cba7b9f741830c3d77b3c90
-
SHA512
2fe44b283bb1c30944196952954778292f43570dbbd9785e94a930a2b004bfaa7823fc6b8052f52ad5da7a941fde82f8f8c3214a614f748b2f5ce97e9a8dca66
-
SSDEEP
3072:pXTTASJKf2n5AxE2NpxOa2XdU2QF4s5XgIDFyHb8kHofL/09rGB:pvASJKenie2xT2NU2OTFQb8Fb0IB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 929f775f2fc187385758ca74613c2340N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent5 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\BH6F8B~1.EXE" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Eset\Nod svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4528 set thread context of 3124 4528 929f775f2fc187385758ca74613c2340N.exe 85 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 929f775f2fc187385758ca74613c2340N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe 3124 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4528 wrote to memory of 3124 4528 929f775f2fc187385758ca74613c2340N.exe 85 PID 4528 wrote to memory of 3124 4528 929f775f2fc187385758ca74613c2340N.exe 85 PID 4528 wrote to memory of 3124 4528 929f775f2fc187385758ca74613c2340N.exe 85 PID 4528 wrote to memory of 3124 4528 929f775f2fc187385758ca74613c2340N.exe 85 PID 4528 wrote to memory of 3124 4528 929f775f2fc187385758ca74613c2340N.exe 85 PID 4528 wrote to memory of 3124 4528 929f775f2fc187385758ca74613c2340N.exe 85 PID 4528 wrote to memory of 3124 4528 929f775f2fc187385758ca74613c2340N.exe 85 PID 4528 wrote to memory of 3124 4528 929f775f2fc187385758ca74613c2340N.exe 85 PID 4528 wrote to memory of 3124 4528 929f775f2fc187385758ca74613c2340N.exe 85 PID 4528 wrote to memory of 3124 4528 929f775f2fc187385758ca74613c2340N.exe 85 PID 4528 wrote to memory of 3124 4528 929f775f2fc187385758ca74613c2340N.exe 85 PID 3124 wrote to memory of 4528 3124 svchost.exe 82 PID 3124 wrote to memory of 4528 3124 svchost.exe 82 PID 3124 wrote to memory of 4528 3124 svchost.exe 82 PID 3124 wrote to memory of 4528 3124 svchost.exe 82 PID 3124 wrote to memory of 4528 3124 svchost.exe 82 PID 3124 wrote to memory of 4528 3124 svchost.exe 82 PID 3124 wrote to memory of 4528 3124 svchost.exe 82 PID 4528 wrote to memory of 4072 4528 929f775f2fc187385758ca74613c2340N.exe 87 PID 4528 wrote to memory of 4072 4528 929f775f2fc187385758ca74613c2340N.exe 87 PID 4528 wrote to memory of 4072 4528 929f775f2fc187385758ca74613c2340N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\929f775f2fc187385758ca74613c2340N.exe"C:\Users\Admin\AppData\Local\Temp\929f775f2fc187385758ca74613c2340N.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\bh6f8bh4b2.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3124
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\hnb98F1.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\929f775f2fc187385758ca74613c2340N.exe""2⤵
- System Location Discovery: System Language Discovery
PID:4072
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD5335358a825939234dc393c684c9120fd
SHA1bab305eb6d607d016df98fa4ed8ace841070205b
SHA2561faa16b8472947a48a07cafa350f58c9cdad28171736a13685a3712003c65ae8
SHA5123ced532b6e089c4e9bee0c34c41a5b587d8b23aaff255b19b74c72f315673adcbc468236ccdbab5c14b30a7e6f386e57e8b956e09c33cb34ebe786b37bd08398