Analysis
-
max time kernel
91s -
max time network
92s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 06:47
Behavioral task
behavioral1
Sample
5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe
Resource
win7-20240708-en
General
-
Target
5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe
-
Size
443KB
-
MD5
b99cbdde7b169462b0a3a320c03c7400
-
SHA1
5b1e53713fc5e5d25ed94d1370b9759833050462
-
SHA256
5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1
-
SHA512
30257a87a69815603e8860f60f28d00e9f4cc5dc497315b2222d04b4d4547583fdbf144b8e50b0efcada915bace94fd57577837d027f753bcfd317ed380a97a7
-
SSDEEP
3072:MgUDUT1q0+29RW6Q93rYfghbEhKsJVPP6+9LasA1//7YXg8kHBOnZtT6mwyswf:XV55pRPQdrFhbEhtVacLaN//2gWF6lkf
Malware Config
Signatures
-
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools chkini.exe -
Executes dropped EXE 1 IoCs
pid Process 3068 chkini.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\chkini.exe 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe File opened for modification C:\Windows\SysWOW64\chkini.exe 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe File created C:\Windows\SysWOW64\chkini.exe chkini.exe -
resource yara_rule behavioral2/memory/212-0-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/files/0x000800000002346d-6.dat upx behavioral2/memory/212-8-0x0000000000400000-0x0000000000448000-memory.dmp upx behavioral2/memory/3068-9-0x0000000000400000-0x0000000000448000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkini.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 3068 chkini.exe 3068 chkini.exe 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 3068 chkini.exe 3068 chkini.exe 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 3068 chkini.exe 3068 chkini.exe 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe 3068 chkini.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 212 wrote to memory of 3068 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 84 PID 212 wrote to memory of 3068 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 84 PID 212 wrote to memory of 3068 212 5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe"C:\Users\Admin\AppData\Local\Temp\5dd38fe5a29977a46d94be14e472a0bbc3fdb3d89c26f01606529f692527e4a1N.exe"1⤵
- Looks for VMWare Tools registry key
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\chkini.exeC:\Windows\system32\chkini.exe2⤵
- Looks for VMWare Tools registry key
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3068
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
460KB
MD5f68a61a76a9ab00fe5d76a1c4722d0d2
SHA1536d1d489b822e4f95bf5d377ef054eda708c95d
SHA256b962ebef806a840f17fb4a48b45a12d200999671977916946809bdf81eee80bc
SHA5126706541f1b04508cb69a066a2868be4eb754c3f5a0c28fe003a68f48f4c894324889a33748df2b24fd253fdbbfa32f6f49e0403fc1277e25d4f4e923fcc8be5d