Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 01:46
Static task
static1
Behavioral task
behavioral1
Sample
603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe
Resource
win10v2004-20240802-en
General
-
Target
603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe
-
Size
2.1MB
-
MD5
a26e3c5047080c42ff5ef9279c17d41e
-
SHA1
d76c12740cc49b3421fcbeea91ecec5f01253b26
-
SHA256
603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba
-
SHA512
96153b76378ee2a32fae1fdb1268c8d66ddb5b267b5f1d41202ce5bc186a0f76a557df15a2221d1d17b08635b505863d46ea48f5d470ac25b381458de58eb22a
-
SSDEEP
49152:1yy2ZIezkaKQ8Vp/9dEhupMK+FvaX9sq8MgAd0Ixg:RdT3vld+EL+8qq8M9d0I
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2404 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4484 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe 4484 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe 4484 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe 4484 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4484 wrote to memory of 4260 4484 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe 84 PID 4484 wrote to memory of 4260 4484 603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe 84 PID 4260 wrote to memory of 2404 4260 cmd.exe 86 PID 4260 wrote to memory of 2404 4260 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe"C:\Users\Admin\AppData\Local\Temp\603ef026260d8b171d64852d3167f51245db79514f045c59005cb13094e19bba.exe"1⤵
- Checks BIOS information in registry
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C sc start vgc2⤵
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\system32\sc.exesc start vgc3⤵
- Launches sc.exe
PID:2404
-
-