Analysis
-
max time kernel
120s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14/09/2024, 09:04
Behavioral task
behavioral1
Sample
ac5f0dcd478769e573281cf2d4b2da60N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ac5f0dcd478769e573281cf2d4b2da60N.exe
Resource
win10v2004-20240802-en
General
-
Target
ac5f0dcd478769e573281cf2d4b2da60N.exe
-
Size
59KB
-
MD5
ac5f0dcd478769e573281cf2d4b2da60
-
SHA1
3709476b1887e006653fab62a4ccbc092d080648
-
SHA256
c33e235028ce92f63762d4ea3c68980aef3c1cf99899bba3e7f5ec4409476d46
-
SHA512
f200e2f38c86fc56620fb6b8b5ea944d24e602792637ec72faa4d7b356e796d0abb2b93614640518b58fb25d69d708d64bb0a2b0dda95b1eb836ef402f24d463
-
SSDEEP
1536:3+ZgwRdiE8cO4p1xRjfTvSq5r3ZiIZ4nouy8uh1aQ3:OeodiUO4p13b9HiIeoutuh1aQ3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation ac5f0dcd478769e573281cf2d4b2da60N.exe -
Executes dropped EXE 1 IoCs
pid Process 3864 AhnSvc.exe -
resource yara_rule behavioral2/memory/1904-0-0x0000000000E70000-0x0000000000E97000-memory.dmp upx behavioral2/files/0x0008000000023479-3.dat upx behavioral2/memory/3864-4-0x00000000009D0000-0x00000000009F7000-memory.dmp upx behavioral2/memory/1904-9-0x0000000000E70000-0x0000000000E97000-memory.dmp upx behavioral2/memory/3864-10-0x00000000009D0000-0x00000000009F7000-memory.dmp upx behavioral2/memory/3864-11-0x00000000009D0000-0x00000000009F7000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AhnUpadate = "\"C:\\ProgramData\\AhnLab\\AhnSvc.exe\" /run" ac5f0dcd478769e573281cf2d4b2da60N.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac5f0dcd478769e573281cf2d4b2da60N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AhnSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1904 ac5f0dcd478769e573281cf2d4b2da60N.exe Token: SeDebugPrivilege 3864 AhnSvc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1904 wrote to memory of 3864 1904 ac5f0dcd478769e573281cf2d4b2da60N.exe 83 PID 1904 wrote to memory of 3864 1904 ac5f0dcd478769e573281cf2d4b2da60N.exe 83 PID 1904 wrote to memory of 3864 1904 ac5f0dcd478769e573281cf2d4b2da60N.exe 83 PID 1904 wrote to memory of 1488 1904 ac5f0dcd478769e573281cf2d4b2da60N.exe 85 PID 1904 wrote to memory of 1488 1904 ac5f0dcd478769e573281cf2d4b2da60N.exe 85 PID 1904 wrote to memory of 1488 1904 ac5f0dcd478769e573281cf2d4b2da60N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac5f0dcd478769e573281cf2d4b2da60N.exe"C:\Users\Admin\AppData\Local\Temp\ac5f0dcd478769e573281cf2d4b2da60N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\ProgramData\AhnLab\AhnSvc.exe"C:\ProgramData\AhnLab\AhnSvc.exe" /run2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3864
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del /q "C:\Users\Admin\AppData\Local\Temp\ac5f0dcd478769e573281cf2d4b2da60N.exe" >> NUL2⤵
- System Location Discovery: System Language Discovery
PID:1488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD57b134d64bd79515d6cd48a0ece42d1cb
SHA136de88fd22c01ce65afbd49c6f19ed4a03812cde
SHA2565bffd2633d84b9a01d518774f1b1908de0187d44d7fe2b1bb5db0eb5ca7fd41e
SHA5126a5ea418db66cf9796ba09bf0813c06c55772516ecbfb15924189b82a9df6cadc87f6b4bb016a4630e4950c6b4f53596f315582fc8795b6bb12359f4dcad23eb