Analysis
-
max time kernel
111s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24/08/2024, 11:59
Static task
static1
Behavioral task
behavioral1
Sample
fc2fe6de0c2c57302dc9dc0c272ee380N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
fc2fe6de0c2c57302dc9dc0c272ee380N.exe
Resource
win10v2004-20240802-en
General
-
Target
fc2fe6de0c2c57302dc9dc0c272ee380N.exe
-
Size
34KB
-
MD5
fc2fe6de0c2c57302dc9dc0c272ee380
-
SHA1
7f20997b80fbd815a778e1550675ba260137e091
-
SHA256
d753105159529e34e1f98e13792b6a2f4898be0405905e31957f2a1ccb09a9b4
-
SHA512
0708f3e993c26f5bbc83fdd31e03890ee2f2032c72b0e3a61bd5aa3586e0fc21c8d3c7c60b41bef2c54be057109b985a756c34c00aaf438d4c4dd8068929c94d
-
SSDEEP
384:Pqc8W5JenQ05X9pZGmvt72B6zS3Gf1qpwPI9vpuR27vvxlLbKKDltl9HrT4:wQ0npvVYYhf1auI9vpe27DbXtlBT4
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5056 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation fc2fe6de0c2c57302dc9dc0c272ee380N.exe -
Executes dropped EXE 1 IoCs
pid Process 4988 oqchost.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\Debug\oqchost.exe fc2fe6de0c2c57302dc9dc0c272ee380N.exe File opened for modification C:\Windows\Debug\oqchost.exe fc2fe6de0c2c57302dc9dc0c272ee380N.exe File opened for modification C:\Windows\Debug\oqchost.exe attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc2fe6de0c2c57302dc9dc0c272ee380N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language oqchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 oqchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz oqchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3392 fc2fe6de0c2c57302dc9dc0c272ee380N.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3392 wrote to memory of 5056 3392 fc2fe6de0c2c57302dc9dc0c272ee380N.exe 84 PID 3392 wrote to memory of 5056 3392 fc2fe6de0c2c57302dc9dc0c272ee380N.exe 84 PID 3392 wrote to memory of 5056 3392 fc2fe6de0c2c57302dc9dc0c272ee380N.exe 84 PID 3392 wrote to memory of 3452 3392 fc2fe6de0c2c57302dc9dc0c272ee380N.exe 90 PID 3392 wrote to memory of 3452 3392 fc2fe6de0c2c57302dc9dc0c272ee380N.exe 90 PID 3392 wrote to memory of 3452 3392 fc2fe6de0c2c57302dc9dc0c272ee380N.exe 90 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5056 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc2fe6de0c2c57302dc9dc0c272ee380N.exe"C:\Users\Admin\AppData\Local\Temp\fc2fe6de0c2c57302dc9dc0c272ee380N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3392 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\oqchost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\FC2FE6~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:3452
-
-
C:\Windows\Debug\oqchost.exeC:\Windows\Debug\oqchost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:4988
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34KB
MD551f25cc43fa1d105a073908f8038f131
SHA1c16fe713520b2bf6fe0f4a3eca42e67e1cadeeba
SHA25666e37c27b4366d60a22b7fdc561a3ac80458596f9ef6e267eb29a531476eb7c6
SHA512eba8a51eaa17424e4b15102562b31ac144c641ddd001061baa3a1b45aef3152a4b315b54e2e3b41888c8ab070e60c7adf465f828950c75ade42e99bda89ac0a0