Analysis
-
max time kernel
118s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 10:45
Static task
static1
Behavioral task
behavioral1
Sample
cc00a04df623e860b9ba56d9bdaaeb60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cc00a04df623e860b9ba56d9bdaaeb60N.exe
Resource
win10v2004-20240802-en
General
-
Target
cc00a04df623e860b9ba56d9bdaaeb60N.exe
-
Size
76KB
-
MD5
cc00a04df623e860b9ba56d9bdaaeb60
-
SHA1
48847997cc24b9b586fd9830c5052ac3d6ad60cc
-
SHA256
2ab9e8f254323014b1614fad16fb08dd9b984e2f3114c599c59a1025a745fd69
-
SHA512
dbbfbb9ab016f890f6140142607163dd4aa9cbeb4c51ef661ef440eaf615cfc7f81956585a6b4ea2d91ad358bf34f441511f9aeaf36915c4c44dfb04d393d648
-
SSDEEP
1536:MvP69lUyW1UwzJmWRaD1gXI7uMrpzrnacxfzZ1:G69lU2UmWVXI7uMlzTFz7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation cc00a04df623e860b9ba56d9bdaaeb60N.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation svchost.exe -
Executes dropped EXE 5 IoCs
pid Process 4592 cc00a04df623e860b9ba56d9bdaaeb60N.exe 2740 svchost.exe 2736 svchost.exe 3712 svchost.exe 4380 svchost.exe -
resource yara_rule behavioral2/memory/4592-6-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4592-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4592-12-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4592-38-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4592-58-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2736-53-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2736-88-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Video Driver = "C:\\Users\\Admin\\AppData\\Roaming\\system\\svchost.exe" reg.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4768 set thread context of 4592 4768 cc00a04df623e860b9ba56d9bdaaeb60N.exe 92 PID 2740 set thread context of 2736 2740 svchost.exe 100 PID 2740 set thread context of 3712 2740 svchost.exe 101 PID 3712 set thread context of 4380 3712 svchost.exe 102 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc00a04df623e860b9ba56d9bdaaeb60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cc00a04df623e860b9ba56d9bdaaeb60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe Token: SeDebugPrivilege 2736 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4768 cc00a04df623e860b9ba56d9bdaaeb60N.exe 4592 cc00a04df623e860b9ba56d9bdaaeb60N.exe 2740 svchost.exe 2736 svchost.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4768 wrote to memory of 4592 4768 cc00a04df623e860b9ba56d9bdaaeb60N.exe 92 PID 4768 wrote to memory of 4592 4768 cc00a04df623e860b9ba56d9bdaaeb60N.exe 92 PID 4768 wrote to memory of 4592 4768 cc00a04df623e860b9ba56d9bdaaeb60N.exe 92 PID 4768 wrote to memory of 4592 4768 cc00a04df623e860b9ba56d9bdaaeb60N.exe 92 PID 4768 wrote to memory of 4592 4768 cc00a04df623e860b9ba56d9bdaaeb60N.exe 92 PID 4768 wrote to memory of 4592 4768 cc00a04df623e860b9ba56d9bdaaeb60N.exe 92 PID 4768 wrote to memory of 4592 4768 cc00a04df623e860b9ba56d9bdaaeb60N.exe 92 PID 4768 wrote to memory of 4592 4768 cc00a04df623e860b9ba56d9bdaaeb60N.exe 92 PID 4592 wrote to memory of 4076 4592 cc00a04df623e860b9ba56d9bdaaeb60N.exe 94 PID 4592 wrote to memory of 4076 4592 cc00a04df623e860b9ba56d9bdaaeb60N.exe 94 PID 4592 wrote to memory of 4076 4592 cc00a04df623e860b9ba56d9bdaaeb60N.exe 94 PID 4076 wrote to memory of 4488 4076 cmd.exe 97 PID 4076 wrote to memory of 4488 4076 cmd.exe 97 PID 4076 wrote to memory of 4488 4076 cmd.exe 97 PID 4592 wrote to memory of 2740 4592 cc00a04df623e860b9ba56d9bdaaeb60N.exe 98 PID 4592 wrote to memory of 2740 4592 cc00a04df623e860b9ba56d9bdaaeb60N.exe 98 PID 4592 wrote to memory of 2740 4592 cc00a04df623e860b9ba56d9bdaaeb60N.exe 98 PID 2740 wrote to memory of 2736 2740 svchost.exe 100 PID 2740 wrote to memory of 2736 2740 svchost.exe 100 PID 2740 wrote to memory of 2736 2740 svchost.exe 100 PID 2740 wrote to memory of 2736 2740 svchost.exe 100 PID 2740 wrote to memory of 2736 2740 svchost.exe 100 PID 2740 wrote to memory of 2736 2740 svchost.exe 100 PID 2740 wrote to memory of 2736 2740 svchost.exe 100 PID 2740 wrote to memory of 2736 2740 svchost.exe 100 PID 2740 wrote to memory of 3712 2740 svchost.exe 101 PID 2740 wrote to memory of 3712 2740 svchost.exe 101 PID 2740 wrote to memory of 3712 2740 svchost.exe 101 PID 2740 wrote to memory of 3712 2740 svchost.exe 101 PID 2740 wrote to memory of 3712 2740 svchost.exe 101 PID 2740 wrote to memory of 3712 2740 svchost.exe 101 PID 2740 wrote to memory of 3712 2740 svchost.exe 101 PID 3712 wrote to memory of 4380 3712 svchost.exe 102 PID 3712 wrote to memory of 4380 3712 svchost.exe 102 PID 3712 wrote to memory of 4380 3712 svchost.exe 102 PID 3712 wrote to memory of 4380 3712 svchost.exe 102 PID 3712 wrote to memory of 4380 3712 svchost.exe 102 PID 3712 wrote to memory of 4380 3712 svchost.exe 102 PID 3712 wrote to memory of 4380 3712 svchost.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc00a04df623e860b9ba56d9bdaaeb60N.exe"C:\Users\Admin\AppData\Local\Temp\cc00a04df623e860b9ba56d9bdaaeb60N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\cc00a04df623e860b9ba56d9bdaaeb60N.exe"C:\Users\Admin\AppData\Local\Temp\cc00a04df623e860b9ba56d9bdaaeb60N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DYCPG.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Video Driver" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\system\svchost.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4488
-
-
-
C:\Users\Admin\AppData\Roaming\system\svchost.exe"C:\Users\Admin\AppData\Roaming\system\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Roaming\system\svchost.exe"C:\Users\Admin\AppData\Roaming\system\svchost.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2736
-
-
C:\Users\Admin\AppData\Roaming\system\svchost.exe"C:\Users\Admin\AppData\Roaming\system\svchost.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Roaming\system\svchost.exe"C:\Users\Admin\AppData\Roaming\system\svchost.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4380
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294B
MD536898294269db0130fcc5d12b8fa6b01
SHA166ae1f4a4fbe4c170eb1a3c187ff8907f4c23596
SHA256aa8c7b53755aaa60c344d081ad71ce7070901222c67f52eafc461627dd66ca11
SHA5127bd8bff12c0bdc46a9fdea199d276010cc3bf7f7b4c5c15598b49223e56eff3accae51229b590a58fd37db830429da7c7a1a9b30655513ba637abc5b6f2053eb
-
Filesize
148B
MD505d958f804a3cb770b18371699915faf
SHA182e91a19f4f23340db8bb5c7d271aa0b590ff723
SHA25661ae6f17d637624fd66d1dfad93a1c6a863aa7caf67d3e267910f4b9212bdf52
SHA5123ff7be267167f2c447e9aeef2f5e84785dd45d08a10738b1b4c1b01b21d3ea29e637ede50b1091211b97fd40ae5b2bea54e053200778228ffde852f8a19ce921
-
Filesize
76KB
MD5cc00a04df623e860b9ba56d9bdaaeb60
SHA148847997cc24b9b586fd9830c5052ac3d6ad60cc
SHA2562ab9e8f254323014b1614fad16fb08dd9b984e2f3114c599c59a1025a745fd69
SHA512dbbfbb9ab016f890f6140142607163dd4aa9cbeb4c51ef661ef440eaf615cfc7f81956585a6b4ea2d91ad358bf34f441511f9aeaf36915c4c44dfb04d393d648
-
Filesize
76KB
MD58ec7d113de115bfbd9dfc34a7aa73917
SHA15b587743e04940f7253cdd9db3178bebe141ef1e
SHA25695dd13b98d84278cbc034670b9a0b23bfc9932822ae317a5a4bd184189a88d21
SHA5129b103305c10aef6eba8c4398c4c0c9f88d4749b8b7c4b667d6574d699fb67d1a5c92b7a793b94ebd8d1434e5aef0129832b2c086934b23b198385acb45b91077