Analysis
-
max time kernel
111s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-08-2024 08:33
Static task
static1
Behavioral task
behavioral1
Sample
c3da0516f06df08b9592e453c44247d0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c3da0516f06df08b9592e453c44247d0N.exe
Resource
win10v2004-20240802-en
General
-
Target
c3da0516f06df08b9592e453c44247d0N.exe
-
Size
193KB
-
MD5
c3da0516f06df08b9592e453c44247d0
-
SHA1
64903d264f25659ec99e7b8dd419cb703f8a9ab8
-
SHA256
e5edb5a0b2e4cf611675b595f23a825635a9b3dee7aba34ae061bcc6955bb32f
-
SHA512
d3118e1187ead203988c68a52ed468998404ad5c0bd28f60f19d7022a7a86e3d586a85e19aa57c420be900628023caa5224c1b733697a7fb5c4a61aafd4aecde
-
SSDEEP
6144:DBs27GluLyXxQQIIIhg6XXXDzXXX13s2III/TAXXXmlXXXLIIIG/ru5Ygn:DK2+yQIII1XXX/XXX62III/UXXXmlXX2
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation c3da0516f06df08b9592e453c44247d0N.exe -
Executes dropped EXE 1 IoCs
pid Process 3044 dcihost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\dcihost.exe c3da0516f06df08b9592e453c44247d0N.exe File opened for modification C:\Windows\Debug\dcihost.exe c3da0516f06df08b9592e453c44247d0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c3da0516f06df08b9592e453c44247d0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcihost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 dcihost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dcihost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4664 c3da0516f06df08b9592e453c44247d0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4664 wrote to memory of 3504 4664 c3da0516f06df08b9592e453c44247d0N.exe 88 PID 4664 wrote to memory of 3504 4664 c3da0516f06df08b9592e453c44247d0N.exe 88 PID 4664 wrote to memory of 3504 4664 c3da0516f06df08b9592e453c44247d0N.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3da0516f06df08b9592e453c44247d0N.exe"C:\Users\Admin\AppData\Local\Temp\c3da0516f06df08b9592e453c44247d0N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4664 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\C3DA05~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3504
-
-
C:\Windows\Debug\dcihost.exeC:\Windows\Debug\dcihost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:3044
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
193KB
MD5e65bac4586522031bf4be35bd30183e2
SHA14565d851079722d9351365879dbfbca00590d7eb
SHA256f2f80f88cbfea4e86e02192e46b77a231bfccf635864bd42ce4b7f16d0c97cf6
SHA5127a143cdd08c8db0aed509acbbf85bfbe294fbe5b215cb7059d96fed1b9f1fe89c373e1340a3e8ec8835feeb949e1b8b9dcea42cf2035699b07e2819d91ed3bf8