Analysis
-
max time kernel
114s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2024 16:00
Behavioral task
behavioral1
Sample
cb6c108191408c78243659c12104c630N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
cb6c108191408c78243659c12104c630N.exe
Resource
win10v2004-20240802-en
General
-
Target
cb6c108191408c78243659c12104c630N.exe
-
Size
63KB
-
MD5
cb6c108191408c78243659c12104c630
-
SHA1
d37b339f120d77366c5172ea3cb55d1e566746c9
-
SHA256
f475e833ff4c783b123e5efa2c7a05e01dd86b9a4b478c5159bdc2520780a4b3
-
SHA512
b1f64e5bc8ae587b270f8bda377e747ed83548aef03dd23eec28e1491e2789b9e632426f2bf6b6d2d4d5b402643daef8f7782f0dc3c0ee66d0dbe666440bfcb6
-
SSDEEP
1536:fvQoLHjw2iWPKMvw71oLyXQUUqnouy8YXVvvvZeee5Lttttz:fv5Ls27BIJoLyXTUyoutYXveeeRttttz
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2170637797-568393320-3232933035-1000\Control Panel\International\Geo\Nation cb6c108191408c78243659c12104c630N.exe -
Executes dropped EXE 1 IoCs
pid Process 2168 bqchost.exe -
resource yara_rule behavioral2/memory/116-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/files/0x0009000000023604-3.dat upx behavioral2/memory/116-5-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral2/memory/2168-6-0x0000000000400000-0x000000000040F000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Debug\bqchost.exe cb6c108191408c78243659c12104c630N.exe File opened for modification C:\Windows\Debug\bqchost.exe cb6c108191408c78243659c12104c630N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb6c108191408c78243659c12104c630N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bqchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 bqchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz bqchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 116 cb6c108191408c78243659c12104c630N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 116 wrote to memory of 1824 116 cb6c108191408c78243659c12104c630N.exe 94 PID 116 wrote to memory of 1824 116 cb6c108191408c78243659c12104c630N.exe 94 PID 116 wrote to memory of 1824 116 cb6c108191408c78243659c12104c630N.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb6c108191408c78243659c12104c630N.exe"C:\Users\Admin\AppData\Local\Temp\cb6c108191408c78243659c12104c630N.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\CB6C10~1.EXE > nul2⤵
- System Location Discovery: System Language Discovery
PID:1824
-
-
C:\Windows\Debug\bqchost.exeC:\Windows\Debug\bqchost.exe1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Checks processor information in registry
PID:2168
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3924,i,3861745594156495651,17595114179815238301,262144 --variations-seed-version --mojo-platform-channel-handle=4300 /prefetch:81⤵PID:4172
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD5ea8f9c959e4ffc08ecdcf24d6dc8bece
SHA162451b93bf44e0d32df795065322e9bc18dd04e8
SHA2566329764e7ccac314750602761363739239ae12d52350320ea9036bc9dd5aa68e
SHA5124af3f7004e456670ba8bf8ba2e677417f7aa57939ff591fea4bdb921140250e9fd7d4af5c8c35274681f86053ed0eda8cb519e3b29da1d57fc4af7176d86bdd2