Analysis
-
max time kernel
107s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/08/2024, 18:53
Static task
static1
Behavioral task
behavioral1
Sample
2e35b03ce43d0c162f1823017fb9d890N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
2e35b03ce43d0c162f1823017fb9d890N.exe
Resource
win10v2004-20240802-en
General
-
Target
2e35b03ce43d0c162f1823017fb9d890N.exe
-
Size
146KB
-
MD5
2e35b03ce43d0c162f1823017fb9d890
-
SHA1
b3fe52204e068f81cf002b95673b77850b43f493
-
SHA256
3b47e325a8b07d1f0fc654f353703c3ae90278b595e7e6416ae081489c4b9f88
-
SHA512
c85cdd949488efd9a00a3b604d803cf3e9d1e2cb22394c71131419d0e7d3c854a610043183e12b8feddb11242653c84a26a9a36bcbd2e1bc41b2eaedcd0d2033
-
SSDEEP
3072:ABAp5XhKpN4eOyVTGfhEClj8jTk+0hnTm52X+q9ln:3bXE9OiTGfhEClq9gKZq/n
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 3 2836 WScript.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hîsts WScript.exe File opened for modification C:\Windows\System32\drivers\etc\hosts cmd.exe File opened for modification C:\Windows\System32\drivers\etc\hosts WScript.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\International\Geo\Nation 2e35b03ce43d0c162f1823017fb9d890N.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 7 IoCs
description ioc Process File created C:\Program Files (x86)\Com\New1\Uninstall.ini 2e35b03ce43d0c162f1823017fb9d890N.exe File opened for modification C:\Program Files (x86)\Com\New1\tansi_minuss.bat 2e35b03ce43d0c162f1823017fb9d890N.exe File opened for modification C:\Program Files (x86)\Com\New1\rg11333i.vbs 2e35b03ce43d0c162f1823017fb9d890N.exe File opened for modification C:\Program Files (x86)\Com\New1\tu33444i.vbs 2e35b03ce43d0c162f1823017fb9d890N.exe File opened for modification C:\Program Files (x86)\Com\New1\a1111.dfg 2e35b03ce43d0c162f1823017fb9d890N.exe File opened for modification C:\Program Files (x86)\Com\New1\s1111f.dfd 2e35b03ce43d0c162f1823017fb9d890N.exe File opened for modification C:\Program Files (x86)\Com\New1\Uninstall.exe 2e35b03ce43d0c162f1823017fb9d890N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2e35b03ce43d0c162f1823017fb9d890N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000_Classes\Local Settings cmd.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4460 wrote to memory of 4956 4460 2e35b03ce43d0c162f1823017fb9d890N.exe 86 PID 4460 wrote to memory of 4956 4460 2e35b03ce43d0c162f1823017fb9d890N.exe 86 PID 4460 wrote to memory of 4956 4460 2e35b03ce43d0c162f1823017fb9d890N.exe 86 PID 4956 wrote to memory of 4804 4956 cmd.exe 89 PID 4956 wrote to memory of 4804 4956 cmd.exe 89 PID 4956 wrote to memory of 4804 4956 cmd.exe 89 PID 4956 wrote to memory of 2836 4956 cmd.exe 90 PID 4956 wrote to memory of 2836 4956 cmd.exe 90 PID 4956 wrote to memory of 2836 4956 cmd.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e35b03ce43d0c162f1823017fb9d890N.exe"C:\Users\Admin\AppData\Local\Temp\2e35b03ce43d0c162f1823017fb9d890N.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Com\New1\tansi_minuss.bat" "2⤵
- Drops file in Drivers directory
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Com\New1\rg11333i.vbs"3⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
PID:4804
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Program Files (x86)\Com\New1\tu33444i.vbs"3⤵
- Blocklisted process makes network request
- System Location Discovery: System Language Discovery
PID:2836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
27B
MD5213c0742081a9007c9093a01760f9f8c
SHA1df53bb518c732df777b5ce19fc7c02dcb2f9d81b
SHA2569681429a2b00c27fe6cb0453f255024813944a7cd460d18797e3c35e81c53d69
SHA51255182c2e353a0027f585535a537b9c309c3bf57f47da54a16e0c415ed6633b725bf40e40a664b1071575feeb7e589d775983516728ec3e51e87a0a29010c4eb9
-
Filesize
909B
MD590e4c6e8c59ccba248ce3e76039a3918
SHA1050d1d3268d4e3dd09dd37bcfb653a9e25b4d69c
SHA2562c6271e4f943f118fc24e2016e3bb3d32f8da2cb041005e6d1a2ec1fd48eb161
SHA512474a826aa64b09109572dc007ff7d377570055a12152a677b72180c846c3d9cbf388e876e6833012c6726ff359379aeada2df0d483e88e020703689067aa2e17
-
Filesize
37B
MD5246f4a66337880c8a04b7f1bb7170d17
SHA1313993f01c080c16bf1bd217e3628b122bd12c21
SHA25696391bffd06a3fe72738561868d41deb85ffae9d0ac50f42403ddf485e3707b3
SHA5120f0ec4c759fb2df384e1cbc06ffd1695ed8c46dbbf987389d7647ef511bf9a291129d3a4dc32aecbcaf0690ce9b67708a9cffd6b525bf50824a3041d40c96fe4
-
Filesize
1KB
MD55bc734cdff6afd0f122bec204e73f30a
SHA1b74a05237f0ad979ce8a7918f83490a6dd10164e
SHA256949b45692b733e06d06f07877bccace84e41bb59eb5776a884ad1f3def9a39d9
SHA5124dfa24f1678fab25f8e3111f3f00f31137fbeeb51bd871af0c928dce3bf8a99d81334fee76cce61e7ede4c00de29c91d3db5e47e8cf3a7c25fd4342d71c74f64
-
Filesize
212B
MD541e0643e1afa912bae8e2e6c5c2ce5d7
SHA1cc3a2ad3426194e4f97cb668068401fc89ca466d
SHA25667a56c7874b67a25915426988e5ba5c2f89783c6ee6bf1a4f06a6eab1b4355f1
SHA512db06752452a2b303ddd0372c5395c34208191143c9cf664426211099a6ecb5d5f8541c2b526b67d0ca41d79c3df5463574201aa0a62d5cf6819287da89156118
-
Filesize
1KB
MD5d7937384247ab445bc17fb3441a6351e
SHA109a2d0703b113d4fcab3c047f133b6cf846632be
SHA256002a7230980b93c8a9e54e8d5ccfb3c13cafdb1b83481b9b2cfe57f3157e957a
SHA512960eac662f94027a821b4b542ef77e3fc31ac608a974a02c13853df85ecb0d9b2ade812fc9ecfe2d6e7a5ada301d8fc3274170a03b4b5b6ce2a764d4f73c9c73