Analysis
-
max time kernel
120s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
09/09/2024, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
315635d07fce39b51d80e42c07f2c2f0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
315635d07fce39b51d80e42c07f2c2f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
315635d07fce39b51d80e42c07f2c2f0N.exe
-
Size
208KB
-
MD5
315635d07fce39b51d80e42c07f2c2f0
-
SHA1
a8d7e8300c2315d8b3f100b1aaab2e2833ebd9e3
-
SHA256
4921f2ba8287b850e29fa473ac498fab8a0c1cfd552044814d208b1581a72735
-
SHA512
53c10309a4cf6a52b4f1d1c8331f7c3729de9c732743abcf7b06619103d0178571a0e60f0a9e033841d6aa3686a87b966614965d8b0a480effa711f952c481ba
-
SSDEEP
3072:Lo7Vnk9g6PgNi0ayG0W2RaZaSw9z+B8D0i8NZGmuu+pT0CivmSNDYX:Lottw6sbF2RaA1B+BwXj+G0ZRG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 315635d07fce39b51d80e42c07f2c2f0N.exe -
Executes dropped EXE 3 IoCs
pid Process 4520 315635d07fce39b51d80e42c07f2c2f0N.exe 2880 datafli.exe 2260 datafli.exe -
resource yara_rule behavioral2/memory/4520-7-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4520-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4520-15-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4520-44-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4520-66-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2260-68-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Key Name = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName\\datafli.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4808 set thread context of 1340 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 93 PID 4808 set thread context of 4520 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 94 PID 2880 set thread context of 1316 2880 datafli.exe 102 PID 2880 set thread context of 2260 2880 datafli.exe 103 PID 2880 set thread context of 0 2880 datafli.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language datafli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 315635d07fce39b51d80e42c07f2c2f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 315635d07fce39b51d80e42c07f2c2f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language datafli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe Token: SeDebugPrivilege 2260 datafli.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 1340 svchost.exe 4520 315635d07fce39b51d80e42c07f2c2f0N.exe 2880 datafli.exe 1316 svchost.exe 2260 datafli.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 4808 wrote to memory of 1340 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 93 PID 4808 wrote to memory of 1340 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 93 PID 4808 wrote to memory of 1340 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 93 PID 4808 wrote to memory of 1340 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 93 PID 4808 wrote to memory of 1340 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 93 PID 4808 wrote to memory of 1340 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 93 PID 4808 wrote to memory of 1340 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 93 PID 4808 wrote to memory of 1340 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 93 PID 4808 wrote to memory of 1340 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 93 PID 4808 wrote to memory of 4520 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 94 PID 4808 wrote to memory of 4520 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 94 PID 4808 wrote to memory of 4520 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 94 PID 4808 wrote to memory of 4520 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 94 PID 4808 wrote to memory of 4520 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 94 PID 4808 wrote to memory of 4520 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 94 PID 4808 wrote to memory of 4520 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 94 PID 4808 wrote to memory of 4520 4808 315635d07fce39b51d80e42c07f2c2f0N.exe 94 PID 4520 wrote to memory of 4464 4520 315635d07fce39b51d80e42c07f2c2f0N.exe 95 PID 4520 wrote to memory of 4464 4520 315635d07fce39b51d80e42c07f2c2f0N.exe 95 PID 4520 wrote to memory of 4464 4520 315635d07fce39b51d80e42c07f2c2f0N.exe 95 PID 4464 wrote to memory of 3632 4464 cmd.exe 98 PID 4464 wrote to memory of 3632 4464 cmd.exe 98 PID 4464 wrote to memory of 3632 4464 cmd.exe 98 PID 4520 wrote to memory of 2880 4520 315635d07fce39b51d80e42c07f2c2f0N.exe 99 PID 4520 wrote to memory of 2880 4520 315635d07fce39b51d80e42c07f2c2f0N.exe 99 PID 4520 wrote to memory of 2880 4520 315635d07fce39b51d80e42c07f2c2f0N.exe 99 PID 2880 wrote to memory of 1316 2880 datafli.exe 102 PID 2880 wrote to memory of 1316 2880 datafli.exe 102 PID 2880 wrote to memory of 1316 2880 datafli.exe 102 PID 2880 wrote to memory of 1316 2880 datafli.exe 102 PID 2880 wrote to memory of 1316 2880 datafli.exe 102 PID 2880 wrote to memory of 1316 2880 datafli.exe 102 PID 2880 wrote to memory of 1316 2880 datafli.exe 102 PID 2880 wrote to memory of 1316 2880 datafli.exe 102 PID 2880 wrote to memory of 1316 2880 datafli.exe 102 PID 2880 wrote to memory of 2260 2880 datafli.exe 103 PID 2880 wrote to memory of 2260 2880 datafli.exe 103 PID 2880 wrote to memory of 2260 2880 datafli.exe 103 PID 2880 wrote to memory of 2260 2880 datafli.exe 103 PID 2880 wrote to memory of 2260 2880 datafli.exe 103 PID 2880 wrote to memory of 2260 2880 datafli.exe 103 PID 2880 wrote to memory of 2260 2880 datafli.exe 103 PID 2880 wrote to memory of 2260 2880 datafli.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\315635d07fce39b51d80e42c07f2c2f0N.exe"C:\Users\Admin\AppData\Local\Temp\315635d07fce39b51d80e42c07f2c2f0N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1340
-
-
C:\Users\Admin\AppData\Local\Temp\315635d07fce39b51d80e42c07f2c2f0N.exe"C:\Users\Admin\AppData\Local\Temp\315635d07fce39b51d80e42c07f2c2f0N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JMYCH.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4464 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3632
-
-
-
C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1316
-
-
C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2260
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5315635d07fce39b51d80e42c07f2c2f0
SHA1a8d7e8300c2315d8b3f100b1aaab2e2833ebd9e3
SHA2564921f2ba8287b850e29fa473ac498fab8a0c1cfd552044814d208b1581a72735
SHA51253c10309a4cf6a52b4f1d1c8331f7c3729de9c732743abcf7b06619103d0178571a0e60f0a9e033841d6aa3686a87b966614965d8b0a480effa711f952c481ba
-
Filesize
148B
MD5cad4294c9f78a2359f70ea09f0f56325
SHA11d02ee76821a5b6fe45aa4f12bac8f86b0043691
SHA25648eb38071c5a2a5c40b3110fcbcb52f6ad0849c3ec20b1cf1be5fa223ac0aaf4
SHA512cd62dd9423a3224d2c4d27853554e0574212cf48a824d562ab3e17231bb839f1dadb12067a7ca39c0cf8ddd5b0e3e8c1dbf601f9822567957e7c29e51fe1693d
-
Filesize
208KB
MD50714a56f45e88ef9b720d0e685b4b8bb
SHA17ae87808e0f561922369832eea95d9f451c46596
SHA256ff9f91a60913c396b57a869ed1c86e4cfa0333788ca5c79072842b2bde3cc6a7
SHA51247e97b3cb353bae4cd0d2bcfe3443c7611680b7b0135a68bffd09d1ff11db30a59dcd59f1c46db1e230425695d8eed353689c1afa71a7f2c2de99cb4b6c66ed3