Analysis
-
max time kernel
125s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02-10-2024 01:31
Static task
static1
Behavioral task
behavioral1
Sample
b273777f47381580fae3238f9a32e86a303c681a49a535caa628a408e07f20d3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b273777f47381580fae3238f9a32e86a303c681a49a535caa628a408e07f20d3.exe
Resource
win10v2004-20240802-en
General
-
Target
b273777f47381580fae3238f9a32e86a303c681a49a535caa628a408e07f20d3.exe
-
Size
1.3MB
-
MD5
e49d3716843584f6fe6a0538d049ddb2
-
SHA1
28912c028a6b0afefe6ccd7e777924e240e93caf
-
SHA256
b273777f47381580fae3238f9a32e86a303c681a49a535caa628a408e07f20d3
-
SHA512
02a0bc89ec23f895a6258962631e4796757087a37aa957d6270c6789132c0b188dc2baaf55f15d4f2e9d918e58d052985f8f8343bc44f7808b2ee30e229d4cef
-
SSDEEP
24576:KfmMv6Ckr7Mny5QtOPUMogxLuRki5d1GYyWF732pxBY64wu:K3v+7/5QtRqOkayooBn4L
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4004 set thread context of 4920 4004 b273777f47381580fae3238f9a32e86a303c681a49a535caa628a408e07f20d3.exe 89 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b273777f47381580fae3238f9a32e86a303c681a49a535caa628a408e07f20d3.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 4920 svchost.exe 4920 svchost.exe 4920 svchost.exe 4920 svchost.exe 4920 svchost.exe 4920 svchost.exe 4920 svchost.exe 4920 svchost.exe 4920 svchost.exe 4920 svchost.exe 4920 svchost.exe 4920 svchost.exe 4920 svchost.exe 4920 svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 4004 b273777f47381580fae3238f9a32e86a303c681a49a535caa628a408e07f20d3.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 4004 wrote to memory of 4920 4004 b273777f47381580fae3238f9a32e86a303c681a49a535caa628a408e07f20d3.exe 89 PID 4004 wrote to memory of 4920 4004 b273777f47381580fae3238f9a32e86a303c681a49a535caa628a408e07f20d3.exe 89 PID 4004 wrote to memory of 4920 4004 b273777f47381580fae3238f9a32e86a303c681a49a535caa628a408e07f20d3.exe 89 PID 4004 wrote to memory of 4920 4004 b273777f47381580fae3238f9a32e86a303c681a49a535caa628a408e07f20d3.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\b273777f47381580fae3238f9a32e86a303c681a49a535caa628a408e07f20d3.exe"C:\Users\Admin\AppData\Local\Temp\b273777f47381580fae3238f9a32e86a303c681a49a535caa628a408e07f20d3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\b273777f47381580fae3238f9a32e86a303c681a49a535caa628a408e07f20d3.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4328,i,8548254608087149642,10333768245962368401,262144 --variations-seed-version --mojo-platform-channel-handle=4292 /prefetch:81⤵PID:3552