Analysis
-
max time kernel
105s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
SiteAdv.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
SiteAdv.exe
Resource
win10v2004-20240802-en
General
-
Target
SiteAdv.exe
-
Size
387KB
-
MD5
14950d0075af292b1baeee5d14eac7ae
-
SHA1
c15319a89adcdb889809b35c4f4e322cdad2b8b4
-
SHA256
8e98eed2ec14621feda75e07379650c05ce509113ea8d949b7367ce00fc7cd38
-
SHA512
851e193b5a3477d8af0c9dac4b8c94c1b94b306f25cb9264d4dc10a73dc83be0f4c50ddba98157a8f1c569a2f1b03e291a0daeddc62d671dc27f5ad11a77bd22
-
SSDEEP
12288:YUomEFRu3xEPE6jh7zKT2VGHEq9hgdF0Fv:YmOMSPE6V7zKT2YE0wUv
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation SiteAdv.exe -
Executes dropped EXE 2 IoCs
pid Process 2628 SiteAdv.exe 1876 SiteAdv.exe -
Loads dropped DLL 2 IoCs
pid Process 2628 SiteAdv.exe 1876 SiteAdv.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\SiteAdv = "C:\\Users\\Admin\\AppData\\Roaming\\SiteAdv\\SiteAdv.exe" SiteAdv.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SiteAdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SiteAdv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SiteAdv.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2628 2376 SiteAdv.exe 86 PID 2376 wrote to memory of 2628 2376 SiteAdv.exe 86 PID 2376 wrote to memory of 2628 2376 SiteAdv.exe 86 PID 2628 wrote to memory of 1876 2628 SiteAdv.exe 88 PID 2628 wrote to memory of 1876 2628 SiteAdv.exe 88 PID 2628 wrote to memory of 1876 2628 SiteAdv.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\SiteAdv.exe"C:\Users\Admin\AppData\Local\Temp\SiteAdv.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Roaming\SiteAdv\SiteAdv.exe"C:\Users\Admin\AppData\Roaming\SiteAdv\SiteAdv.exe" /SMS2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Roaming\SiteAdv\SiteAdv.exeC:\Users\Admin\AppData\Roaming\SiteAdv\SiteAdv.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
86KB
MD5ed8eb0655aa1000678e2db8eee9b9924
SHA1626b3142c06630c2d3beb4e1643d8b08830e41d9
SHA256fe7a6954e18feddeeb6fcdaaa8ac9248c8185703c2505d7f249b03d8d8897104
SHA5123ad690c6e6a0250fabafe8c1be24ead3be4cd50030aefc51ba7bd1be54ae24bc2699887fb4bb42463fea17246083c5ab227c34b01af77b6b710f144f0004f55c
-
Filesize
34KB
MD50584b8020e41db48e267d26c641339c3
SHA1de8b5b36e3638dc757cc3e7e7345b52f3e14b72e
SHA256eb3b4e82ddfdb118d700a853587c9589c93879f62f576e104a62bdaa5a338d7b
SHA5123a81b260a37b3bdfc0fffa08ab98cf6ebff3123a76c6f637d83471187e357d0af2e8d9eefe6ea32af9274dde732a7795312dded500a92c6bf3bedaf408abab07
-
Filesize
129KB
MD5ed670c6c7abdfc57b3073a02dfb21dab
SHA17dba439c21f4fb19278efefae23092e23f7b9c1c
SHA256139c39e0dc8f8f4eb9b25b20669b4f30ffcbe2197e3a9f69d0043107d06a2cb4
SHA512afab49d78d0b8a6111a038ba47101d3ccd82d91d85752a0edf50d514fc5baf0b5118a5165252ac6e8f437881121c309adc703679c84a6a69fd8b22343774fac5