Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
25-09-2024 16:37
Behavioral task
behavioral1
Sample
8ca203f91fbdc5fd20f63fc8409ce52785852306de1922f8c14f5d1ce0c01820.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ca203f91fbdc5fd20f63fc8409ce52785852306de1922f8c14f5d1ce0c01820.exe
Resource
win10v2004-20240802-en
General
-
Target
8ca203f91fbdc5fd20f63fc8409ce52785852306de1922f8c14f5d1ce0c01820.exe
-
Size
227KB
-
MD5
30bc3a4843995db743e3ce3f43cb1cd2
-
SHA1
dddfca415d3a7b0c1e3f44b70d72f38c8d7e47eb
-
SHA256
8ca203f91fbdc5fd20f63fc8409ce52785852306de1922f8c14f5d1ce0c01820
-
SHA512
c080812f8c4048a5e473f618736ab042fa0b254cd5f8870384f12caac1492f4d848757665cd4bca787231a03dc66ed48017b6ca0319ef7810b24e1bda61e53a1
-
SSDEEP
3072:i3pox1w8FCoFjKej0u/Dt1XWhlPhoutPFLtVBjnmATFUJgsL:i58u8PFjcurvXUlPhoSPvfTZpwgG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000\Control Panel\International\Geo\Nation 8ca203f91fbdc5fd20f63fc8409ce52785852306de1922f8c14f5d1ce0c01820.exe -
resource yara_rule behavioral2/memory/4756-0-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral2/memory/4756-9-0x0000000000400000-0x0000000000479000-memory.dmp upx -
Access Token Manipulation: Create Process with Token 1 TTPs 1 IoCs
pid Process 1552 reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chcp.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fltMC.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8ca203f91fbdc5fd20f63fc8409ce52785852306de1922f8c14f5d1ce0c01820.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.Admin\shell\runas\command reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.Admin reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.Admin\shell reg.exe Key created \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.Admin\shell\runas reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-523280732-2327480845-3730041215-1000_Classes\.Admin\shell\runas\command\ = "cmd /x /d /r set \"f0=%2\" &call \"%2\" %3" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1552 reg.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4756 wrote to memory of 2160 4756 8ca203f91fbdc5fd20f63fc8409ce52785852306de1922f8c14f5d1ce0c01820.exe 82 PID 4756 wrote to memory of 2160 4756 8ca203f91fbdc5fd20f63fc8409ce52785852306de1922f8c14f5d1ce0c01820.exe 82 PID 4756 wrote to memory of 2160 4756 8ca203f91fbdc5fd20f63fc8409ce52785852306de1922f8c14f5d1ce0c01820.exe 82 PID 2160 wrote to memory of 3780 2160 cmd.exe 84 PID 2160 wrote to memory of 3780 2160 cmd.exe 84 PID 2160 wrote to memory of 3780 2160 cmd.exe 84 PID 2160 wrote to memory of 2332 2160 cmd.exe 85 PID 2160 wrote to memory of 2332 2160 cmd.exe 85 PID 2160 wrote to memory of 2332 2160 cmd.exe 85 PID 2160 wrote to memory of 1552 2160 cmd.exe 86 PID 2160 wrote to memory of 1552 2160 cmd.exe 86 PID 2160 wrote to memory of 1552 2160 cmd.exe 86 PID 2160 wrote to memory of 3988 2160 cmd.exe 87 PID 2160 wrote to memory of 3988 2160 cmd.exe 87 PID 2160 wrote to memory of 3988 2160 cmd.exe 87 PID 2160 wrote to memory of 988 2160 cmd.exe 88 PID 2160 wrote to memory of 988 2160 cmd.exe 88 PID 2160 wrote to memory of 988 2160 cmd.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ca203f91fbdc5fd20f63fc8409ce52785852306de1922f8c14f5d1ce0c01820.exe"C:\Users\Admin\AppData\Local\Temp\8ca203f91fbdc5fd20f63fc8409ce52785852306de1922f8c14f5d1ce0c01820.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Bloatware\Bloatware.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\chcp.comchcp 12543⤵
- System Location Discovery: System Language Discovery
PID:3780
-
-
C:\Windows\SysWOW64\mode.commode con: cols=55 lines=123⤵
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Windows\SysWOW64\reg.exereg add hkcu\software\classes\.Admin\shell\runas\command /f /ve /d "cmd /x /d /r set \"f0=%2\" &call \"%2\" %3"3⤵
- Access Token Manipulation: Create Process with Token
- System Location Discovery: System Language Discovery
- Modifies registry class
- Modifies registry key
PID:1552
-
-
C:\Windows\SysWOW64\fltMC.exefltmc3⤵
- System Location Discovery: System Language Discovery
PID:3988
-
-
C:\Windows\SysWOW64\mode.commode con: cols=55 lines=123⤵
- System Location Discovery: System Language Discovery
PID:988
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD5277077c220e9a625d79eb0661b933a9c
SHA195589a8513bce992d04d09e1bfc7e5545f142bb1
SHA256fc239f9c3f47f97c85efdf7730161221c5487f833f5c4a4fcc04a768141749ad
SHA512200880a9ab68b54e9917a4007b3deee6a1c1be4e98c9214e594ab8d214975bd19a2c97a0c918efca3ea3e8cc21ce20b4c948ddcf5d09781a0576c6ffa41ab24e