Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30/09/2024, 11:09
Static task
static1
Behavioral task
behavioral1
Sample
3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe
Resource
win10v2004-20240802-en
General
-
Target
3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe
-
Size
208KB
-
MD5
40e1a1c5d93a6d624f2da31109d732a0
-
SHA1
7b6c8e27adf9159e08129b5455880cfe6b9f5d27
-
SHA256
3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41a
-
SHA512
305ccac723e883b84e2008d0195f9a48cf984308ef2f2f8d16eb3671a2889cebd6bfe7c3b15ef8b7272c081ec13f94d635d2b0550cf79991b7a41060488da459
-
SSDEEP
3072:Lo7Vnk9g6PgNi0ayG0W2RaZaSw9z+B8D0i8NZGmuu+pT0CivmSNDYX:Lottw6sbF2RaA1B+BwXj+G0ZRG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe -
Executes dropped EXE 3 IoCs
pid Process 2968 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 2044 datafli.exe 3516 datafli.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Key Name = "C:\\Users\\Admin\\AppData\\Roaming\\FolderName\\datafli.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1560 set thread context of 1748 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 89 PID 1560 set thread context of 2968 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 90 PID 2044 set thread context of 5064 2044 datafli.exe 98 PID 2044 set thread context of 3516 2044 datafli.exe 99 PID 2044 set thread context of 0 2044 datafli.exe -
resource yara_rule behavioral2/memory/2968-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2968-18-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2968-20-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2968-47-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/2968-66-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/3516-69-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language datafli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language datafli.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe 1748 svchost.exe -
Suspicious use of AdjustPrivilegeToken 53 IoCs
description pid Process Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe Token: SeDebugPrivilege 3516 datafli.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 1748 svchost.exe 2968 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 2044 datafli.exe 5064 svchost.exe 3516 datafli.exe -
Suspicious use of WriteProcessMemory 43 IoCs
description pid Process procid_target PID 1560 wrote to memory of 1748 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 89 PID 1560 wrote to memory of 1748 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 89 PID 1560 wrote to memory of 1748 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 89 PID 1560 wrote to memory of 1748 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 89 PID 1560 wrote to memory of 1748 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 89 PID 1560 wrote to memory of 1748 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 89 PID 1560 wrote to memory of 1748 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 89 PID 1560 wrote to memory of 1748 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 89 PID 1560 wrote to memory of 1748 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 89 PID 1560 wrote to memory of 2968 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 90 PID 1560 wrote to memory of 2968 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 90 PID 1560 wrote to memory of 2968 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 90 PID 1560 wrote to memory of 2968 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 90 PID 1560 wrote to memory of 2968 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 90 PID 1560 wrote to memory of 2968 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 90 PID 1560 wrote to memory of 2968 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 90 PID 1560 wrote to memory of 2968 1560 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 90 PID 2968 wrote to memory of 1356 2968 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 91 PID 2968 wrote to memory of 1356 2968 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 91 PID 2968 wrote to memory of 1356 2968 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 91 PID 1356 wrote to memory of 4036 1356 cmd.exe 94 PID 1356 wrote to memory of 4036 1356 cmd.exe 94 PID 1356 wrote to memory of 4036 1356 cmd.exe 94 PID 2968 wrote to memory of 2044 2968 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 95 PID 2968 wrote to memory of 2044 2968 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 95 PID 2968 wrote to memory of 2044 2968 3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe 95 PID 2044 wrote to memory of 5064 2044 datafli.exe 98 PID 2044 wrote to memory of 5064 2044 datafli.exe 98 PID 2044 wrote to memory of 5064 2044 datafli.exe 98 PID 2044 wrote to memory of 5064 2044 datafli.exe 98 PID 2044 wrote to memory of 5064 2044 datafli.exe 98 PID 2044 wrote to memory of 5064 2044 datafli.exe 98 PID 2044 wrote to memory of 5064 2044 datafli.exe 98 PID 2044 wrote to memory of 5064 2044 datafli.exe 98 PID 2044 wrote to memory of 5064 2044 datafli.exe 98 PID 2044 wrote to memory of 3516 2044 datafli.exe 99 PID 2044 wrote to memory of 3516 2044 datafli.exe 99 PID 2044 wrote to memory of 3516 2044 datafli.exe 99 PID 2044 wrote to memory of 3516 2044 datafli.exe 99 PID 2044 wrote to memory of 3516 2044 datafli.exe 99 PID 2044 wrote to memory of 3516 2044 datafli.exe 99 PID 2044 wrote to memory of 3516 2044 datafli.exe 99 PID 2044 wrote to memory of 3516 2044 datafli.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe"C:\Users\Admin\AppData\Local\Temp\3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1748
-
-
C:\Users\Admin\AppData\Local\Temp\3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe"C:\Users\Admin\AppData\Local\Temp\3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DYCPF.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Key Name" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4036
-
-
-
C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5064
-
-
C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"C:\Users\Admin\AppData\Roaming\FolderName\datafli.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3516
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\3e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41aN.exe
Filesize208KB
MD540e1a1c5d93a6d624f2da31109d732a0
SHA17b6c8e27adf9159e08129b5455880cfe6b9f5d27
SHA2563e22cd2ddf85ecd2c228910c6ad13ef22307c0c03950469c5a8d10967c79f41a
SHA512305ccac723e883b84e2008d0195f9a48cf984308ef2f2f8d16eb3671a2889cebd6bfe7c3b15ef8b7272c081ec13f94d635d2b0550cf79991b7a41060488da459
-
Filesize
148B
MD5cad4294c9f78a2359f70ea09f0f56325
SHA11d02ee76821a5b6fe45aa4f12bac8f86b0043691
SHA25648eb38071c5a2a5c40b3110fcbcb52f6ad0849c3ec20b1cf1be5fa223ac0aaf4
SHA512cd62dd9423a3224d2c4d27853554e0574212cf48a824d562ab3e17231bb839f1dadb12067a7ca39c0cf8ddd5b0e3e8c1dbf601f9822567957e7c29e51fe1693d
-
Filesize
208KB
MD5ed0eab1971c6ebd6897f537ac1c61be1
SHA11cb79bbf807e07eb0d64aef1f63429bc013428ee
SHA2563f7157f3adbbb79bafe2d7398ec63dc386d16fd6528cc18d850e53144ea785d5
SHA512e52780042cc2f91258c5190817ccff9014a14713348f15aec25641cd008e78c90d99a85ef13eaa5b4e457cad91190864346c38f1136729a816e93c07dd317534