Analysis
-
max time kernel
119s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25/08/2024, 05:26
Static task
static1
Behavioral task
behavioral1
Sample
3b79514bd6363e670f982a9f55daa070N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3b79514bd6363e670f982a9f55daa070N.exe
Resource
win10v2004-20240802-en
General
-
Target
3b79514bd6363e670f982a9f55daa070N.exe
-
Size
179KB
-
MD5
3b79514bd6363e670f982a9f55daa070
-
SHA1
1dc003d4c75e13ff325dee8161e97011792141a4
-
SHA256
c46400e9c40c1a5e68fe2b148e716f09448ed0626072129db27e766192d33bb9
-
SHA512
27c1d44fa34bd252fdf548d5f43640ba7cfb32ff94efd514a6d2b7e18e0049dd5db102bbb37154c73cc87961f98bcdec23e1840a0e09e1f01fe5580f54110bc6
-
SSDEEP
3072:DXTTASJKf2n5AxE2NpxOa2XdU2QF4s5XgIDFyHb8kHofL/09rGB:DvASJKenie2xT2NU2OTFQb8Fb0IB
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation 3b79514bd6363e670f982a9f55daa070N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IntelPowerAgent1 = "rundll32.exe shell32.dll, ShellExec_RunDLL C:\\PROGRA~3\\24B2BB~1.EXE" svchost.exe -
Checks for any installed AV software in registry 1 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Avira svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\AVAST Software\Avast svchost.exe Key opened \REGISTRY\MACHINE\Software\WOW6432Node\Eset\Nod svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4192 set thread context of 2712 4192 3b79514bd6363e670f982a9f55daa070N.exe 84 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3b79514bd6363e670f982a9f55daa070N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe 2712 svchost.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4192 wrote to memory of 2712 4192 3b79514bd6363e670f982a9f55daa070N.exe 84 PID 4192 wrote to memory of 2712 4192 3b79514bd6363e670f982a9f55daa070N.exe 84 PID 4192 wrote to memory of 2712 4192 3b79514bd6363e670f982a9f55daa070N.exe 84 PID 4192 wrote to memory of 2712 4192 3b79514bd6363e670f982a9f55daa070N.exe 84 PID 4192 wrote to memory of 2712 4192 3b79514bd6363e670f982a9f55daa070N.exe 84 PID 4192 wrote to memory of 2712 4192 3b79514bd6363e670f982a9f55daa070N.exe 84 PID 4192 wrote to memory of 2712 4192 3b79514bd6363e670f982a9f55daa070N.exe 84 PID 4192 wrote to memory of 2712 4192 3b79514bd6363e670f982a9f55daa070N.exe 84 PID 4192 wrote to memory of 2712 4192 3b79514bd6363e670f982a9f55daa070N.exe 84 PID 4192 wrote to memory of 2712 4192 3b79514bd6363e670f982a9f55daa070N.exe 84 PID 4192 wrote to memory of 2712 4192 3b79514bd6363e670f982a9f55daa070N.exe 84 PID 2712 wrote to memory of 4192 2712 svchost.exe 83 PID 2712 wrote to memory of 4192 2712 svchost.exe 83 PID 2712 wrote to memory of 4192 2712 svchost.exe 83 PID 2712 wrote to memory of 4192 2712 svchost.exe 83 PID 2712 wrote to memory of 4192 2712 svchost.exe 83 PID 2712 wrote to memory of 4192 2712 svchost.exe 83 PID 2712 wrote to memory of 4192 2712 svchost.exe 83 PID 4192 wrote to memory of 3292 4192 3b79514bd6363e670f982a9f55daa070N.exe 86 PID 4192 wrote to memory of 3292 4192 3b79514bd6363e670f982a9f55daa070N.exe 86 PID 4192 wrote to memory of 3292 4192 3b79514bd6363e670f982a9f55daa070N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b79514bd6363e670f982a9f55daa070N.exe"C:\Users\Admin\AppData\Local\Temp\3b79514bd6363e670f982a9f55daa070N.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\svchost.exeC:\ProgramData\24b2bbbb08.exe2⤵
- Adds Run key to start application
- Checks for any installed AV software in registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2712
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\ProgramData\lybFACA.tmp.bat" "C:\Users\Admin\AppData\Local\Temp\3b79514bd6363e670f982a9f55daa070N.exe""2⤵
- System Location Discovery: System Language Discovery
PID:3292
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33B
MD549192068b246b2e124d9aea5c0da8e19
SHA149afaf96c4d383ba87bd07e2392e6cb142aebd1d
SHA2564a8ece4bb72373ec39e2e32184bfd1b355f488049def5ffc0c188915d7a4e6ec
SHA51259e9ab56c044f8c7aa496950ce73431b5475e1c858960b46cb4ba711a2be02e79a7d03edcf5f8d18baa467abbe56b3f950463fc823f370894795a6d33997f4e3