Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 14:15
Static task
static1
Behavioral task
behavioral1
Sample
3.exe
Resource
win7-20240903-en
General
-
Target
3.exe
-
Size
27.7MB
-
MD5
e516566b25ae853edd6aad00854d782a
-
SHA1
868bc5e3b851337eb9094de303e395fc5be8d7ae
-
SHA256
9cb2b6cafc2c6ec61d2f997789e7a923d71b8663f57a531820d958971f8a8e84
-
SHA512
7b631df7d1786f901669869020430a2caa7b8fc493c5331a00137f60af0827e8c42638a89f1381aed2954bc0b280a1591a0561ba3aad5503f541d8ca12f466c5
-
SSDEEP
393216:aT903qKSVL/D0mOWBLGZz1cVeN1zSuCK+RO4b61B2YpLlsmb2wIoV1Keejdnd:ah0OVL/rBLGp1JdCr6zRlsm1IoV1G9d
Malware Config
Signatures
-
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 3.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation 3.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 3.exe File opened (read-only) \??\P: 3.exe File opened (read-only) \??\Q: 3.exe File opened (read-only) \??\T: 3.exe File opened (read-only) \??\W: 3.exe File opened (read-only) \??\Y: 3.exe File opened (read-only) \??\V: 3.exe File opened (read-only) \??\X: 3.exe File opened (read-only) \??\E: 3.exe File opened (read-only) \??\H: 3.exe File opened (read-only) \??\I: 3.exe File opened (read-only) \??\K: 3.exe File opened (read-only) \??\N: 3.exe File opened (read-only) \??\R: 3.exe File opened (read-only) \??\Z: 3.exe File opened (read-only) \??\J: 3.exe File opened (read-only) \??\M: 3.exe File opened (read-only) \??\S: 3.exe File opened (read-only) \??\U: 3.exe File opened (read-only) \??\G: 3.exe File opened (read-only) \??\O: 3.exe -
resource yara_rule behavioral2/memory/1288-11-0x0000000000400000-0x0000000000F24000-memory.dmp upx behavioral2/memory/1288-19-0x0000000000400000-0x0000000000F24000-memory.dmp upx behavioral2/memory/1288-20-0x0000000000400000-0x0000000000F24000-memory.dmp upx behavioral2/memory/1288-31-0x0000000000400000-0x0000000000F24000-memory.dmp upx behavioral2/memory/1616-45-0x0000000000400000-0x0000000000F24000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 3.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS 3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer 3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName 3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemVersion 3.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\BIOSVersion 3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4324 3.exe 4460 3.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 4324 wrote to memory of 1288 4324 3.exe 93 PID 1288 wrote to memory of 4460 1288 3.exe 94 PID 1288 wrote to memory of 4460 1288 3.exe 94 PID 1288 wrote to memory of 4460 1288 3.exe 94 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99 PID 4460 wrote to memory of 1616 4460 3.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"2⤵
- Checks BIOS information in registry
- Checks computer location settings
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\3.exe"C:\Users\Admin\AppData\Local\Temp\3.exe"4⤵
- System Location Discovery: System Language Discovery
PID:1616
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
4.5MB
MD59b77414cc34417bb9dd753e14e26ef49
SHA154cc4425f9656a19fcde9cb694ffff221f8b733f
SHA256d0b0427a276b2506138bb4bc223e27eed7a33aeea7a7ac080b2ec85c5d950ffe
SHA512d91ea43e40bc864c7587f9e5ec03ada8a7d027c4c393dfc6ca6f004b4cc89e8157a33672439020e2081a224c22840653dda4976a89d5378404cbae2b53ad9edc