Analysis
-
max time kernel
120s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe
Resource
win10v2004-20240802-en
General
-
Target
b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe
-
Size
108KB
-
MD5
a1c5a2efb078304bdc827fa6aa5323a0
-
SHA1
14f10a498748f2c0a97a4416a360c1984c45a3fa
-
SHA256
b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59
-
SHA512
c54c09333561c4190038807b8ae8bfdd5c4ad64acadda7ab94987f46abf81f5b84544bc5cb69329e2958952c720a9d78b0f469265e0888575f407343540a12da
-
SSDEEP
1536:vmujKiB6oQ7Lh5+sXmNP0ttJPXLq0zTrkC:O2moIeZPEXTzToC
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe Set value (int) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" weize.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe -
Executes dropped EXE 1 IoCs
pid Process 4200 weize.exe -
Adds Run key to start application 2 TTPs 27 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /w" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /x" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /h" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /y" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /j" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /f" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /v" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /i" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /s" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /m" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /r" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /u" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /n" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /e" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /p" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /q" b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /a" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /g" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /b" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /l" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /t" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /z" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /d" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /o" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /c" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /q" weize.exe Set value (str) \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\weize = "C:\\Users\\Admin\\weize.exe /k" weize.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language weize.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2940 b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe 2940 b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe 4200 weize.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2940 b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe 4200 weize.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2940 wrote to memory of 4200 2940 b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe 82 PID 2940 wrote to memory of 4200 2940 b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe 82 PID 2940 wrote to memory of 4200 2940 b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe"C:\Users\Admin\AppData\Local\Temp\b6ca5a799b331ba4879f94abae4a2ce31c26f4c910909f617562d4f5173bfd59N.exe"1⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\weize.exe"C:\Users\Admin\weize.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4200
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
108KB
MD5c261d11294511a08aa4fccfd86d7d91e
SHA1a403b31a579ec2da5c93f8aed3c038f7a9bf98f2
SHA25683fd3f36363830aaec5a607f6b0d88ac92adc7c2082a62dac8f68815d62ab09d
SHA51275a9885f7ae652d2f0c9780fa4872cbef6b3c1aa63ef56ff5da4e7506b5156d47ff2d0c27415c5aa71dc4e0bf47c5932f289094e1ce48ec2be2d1bf643e55a92