Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/09/2024, 06:55
Static task
static1
Behavioral task
behavioral1
Sample
1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe
Resource
win10v2004-20240802-en
General
-
Target
1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe
-
Size
2.7MB
-
MD5
3020110d12d1ac3bcf366d45ce9ca2ad
-
SHA1
64020496503256291220848eee13ba2b139138aa
-
SHA256
1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808
-
SHA512
3bf976033d13cc13fedaa3b427074f8227607ada7bf96d9998a75632f236fabad6ea29580638a77b5a1d64c09f931f2cfc1051cd74947c766e86c3d9613b04d4
-
SSDEEP
49152:kdTfLTYegaJ7dKvri9ZD5CVFUJ2iZf8pXsUa+pYgcHC+br13kvUzfA9h+:kTYe1J7rZkCC0HDbcW
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation 1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\yckhd.lnk Client.exe -
Executes dropped EXE 1 IoCs
pid Process 2600 Client.exe -
resource yara_rule behavioral2/memory/4644-1-0x0000000068CD0000-0x0000000068CDF000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\EXFQDX = "C:\\Client.exe //yckhd01" Client.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4644 1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe 4644 1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2600 Client.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4644 1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe 4644 1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe 4644 1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe 2600 Client.exe 2600 Client.exe 2600 Client.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4644 wrote to memory of 2600 4644 1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe 96 PID 4644 wrote to memory of 2600 4644 1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe 96 PID 4644 wrote to memory of 2600 4644 1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe"C:\Users\Admin\AppData\Local\Temp\1785f3eb202e7ce1b5bbffc2b126a2a470ba1a6a9feab71cc8a2f758fd6e7808.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Client.exe"C:\Client.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
649KB
MD5bf5aaf0e7690c42f792d3f0a6a99532d
SHA1d997491486f2a617e1315d1e5936ef7eb4990989
SHA25645b58d2770f9074cbfea11fdece1dc7774218bcdb3c338608130803b42d0e7be
SHA512f2d40b8087feec137d53dae39e93e4d52ba52dfacb67c7a3b6fa8be926e3619515874df80b5f32bf3cb824457bdd14af724ee867b8fc77c5c2fff5cf00966918