Analysis
-
max time kernel
94s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
03/10/2024, 15:01
Static task
static1
Behavioral task
behavioral1
Sample
4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe
Resource
win10v2004-20240802-en
General
-
Target
4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe
-
Size
280KB
-
MD5
5894805aaa3a51eebd7d94578c056980
-
SHA1
9febdc5b113083c338bea61af7b1e435d3d4c03f
-
SHA256
4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772
-
SHA512
65af87cd534cfa371be5af254c3d2826a5a8d34dcafc92f0d98c4497610064ca0a0e07ae03daaf3f830ffbcca1795bf7c0542b29ebce101d45f96820d5bf7604
-
SSDEEP
6144:E+sA4cO1nVqHXYM0CCVMZ+sA4cO1nVqHHYM0CCVZ:EJAFRYLVMZJAFRYLVZ
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe -
Executes dropped EXE 2 IoCs
pid Process 1396 ntfsus.exe 2864 SMSS.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\com\SMSS.EXE 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe File created C:\Windows\SysWOW64\com\SMSS.EXE 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cacls.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4260 wrote to memory of 2516 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 82 PID 4260 wrote to memory of 2516 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 82 PID 4260 wrote to memory of 2516 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 82 PID 4260 wrote to memory of 632 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 83 PID 4260 wrote to memory of 632 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 83 PID 4260 wrote to memory of 632 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 83 PID 4260 wrote to memory of 908 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 85 PID 4260 wrote to memory of 908 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 85 PID 4260 wrote to memory of 908 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 85 PID 4260 wrote to memory of 1396 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 88 PID 4260 wrote to memory of 1396 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 88 PID 4260 wrote to memory of 1396 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 88 PID 4260 wrote to memory of 2456 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 89 PID 4260 wrote to memory of 2456 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 89 PID 4260 wrote to memory of 2456 4260 4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe 89 PID 2456 wrote to memory of 2864 2456 cmd.exe 91 PID 2456 wrote to memory of 2864 2456 cmd.exe 91 PID 2456 wrote to memory of 2864 2456 cmd.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe"C:\Users\Admin\AppData\Local\Temp\4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772N.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\com /e /t /g Admin:F2⤵
- System Location Discovery: System Language Discovery
PID:2516
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\com\LSASS.EXE /e /t /g Admin:F2⤵
- System Location Discovery: System Language Discovery
PID:632
-
-
C:\Windows\SysWOW64\cacls.exe"C:\Windows\System32\cacls.exe" C:\Windows\system32\com\SMSS.EXE /e /t /g Admin:F2⤵
- System Location Discovery: System Language Discovery
PID:908
-
-
C:\ntfsus.exeC:\ntfsus.exe2⤵
- Executes dropped EXE
PID:1396
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c "C:\Windows\system32\com\SMSS.EXE c:\users\admin\appdata\local\temp\4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772n.exe^|c:\users\admin\appdata\local\temp\4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772n.exe.log"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\com\SMSS.EXEC:\Windows\system32\com\SMSS.EXE c:\users\admin\appdata\local\temp\4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772n.exe|c:\users\admin\appdata\local\temp\4de2ceaf51eb42d520acf8e08c9750789db257afb6be05e24c4a3b2fbc4f0772n.exe.log3⤵
- Executes dropped EXE
PID:2864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5b2d5b77c463a4b6f7711333c2b4b8be2
SHA1c53e3ac0256236e871f7516c9bb0d82d302a0514
SHA256d684183769ac6939f8bd02d633f6a10d6c68130f52814196afe3ce8519cdfd7a
SHA51255d89e89e25bbb8f40406f0e6cf4bf10c6e0f62649897b352a791e833cd0ad8b485a7b4508e0a4585d77befc5c30f0003b35adfeb4ee19e01508970e5bb9106b
-
Filesize
46KB
MD52530e171448c1d3805aa494d95967517
SHA1d79870e9b2121af8a50e787bf3f89fc507bbe9a2
SHA256b1d177fbbc1fc7fc19138d7c1216cc1071809ec0f60ef550dc7f200710e46050
SHA512af08b275ed78d5326c287e98014497b693455680e637c11a6704e762075ac2da711c7c79033e9ab297e9bcf39fec38fd462c65e1036a657918ab9ff52a45117f