Analysis
-
max time kernel
113s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 04:11
Static task
static1
Behavioral task
behavioral1
Sample
5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe
Resource
win10v2004-20241007-en
General
-
Target
5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe
-
Size
7.9MB
-
MD5
b8af7fcdb4e96271e568fcbaa887543e
-
SHA1
cdc0bc7d132fffdb10d9519aa731e6d7023bcc8f
-
SHA256
5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59
-
SHA512
8082f728d17c650e37404b47584a27da45d332f788dfa8d6a03bcd3a1755c174534923277c6c1c600926224fc90a581a19feb0e2297597b98dde0182ace843bc
-
SSDEEP
196608:8Fazg7DSmFazg7DSmFazg7DSmFazg7DS/:Jg7ubg7ubg7ubg7u/
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe -
Executes dropped EXE 3 IoCs
pid Process 4616 7D57AD13E21.exe 1280 Scegli_nome_allegato.exe 3208 7D57AD13E21.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\7D57AD13E21.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4616 set thread context of 3208 4616 7D57AD13E21.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7D57AD13E21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Scegli_nome_allegato.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7D57AD13E21.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch Scegli_nome_allegato.exe Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" Scegli_nome_allegato.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Software\Microsoft\Internet Explorer\IESettingSync Scegli_nome_allegato.exe Set value (int) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" Scegli_nome_allegato.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 228 reg.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1280 Scegli_nome_allegato.exe 1280 Scegli_nome_allegato.exe 1280 Scegli_nome_allegato.exe 3208 7D57AD13E21.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 3120 wrote to memory of 228 3120 5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe 89 PID 3120 wrote to memory of 228 3120 5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe 89 PID 3120 wrote to memory of 228 3120 5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe 89 PID 3120 wrote to memory of 4616 3120 5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe 91 PID 3120 wrote to memory of 4616 3120 5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe 91 PID 3120 wrote to memory of 4616 3120 5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe 91 PID 3120 wrote to memory of 1280 3120 5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe 92 PID 3120 wrote to memory of 1280 3120 5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe 92 PID 3120 wrote to memory of 1280 3120 5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe 92 PID 4616 wrote to memory of 3208 4616 7D57AD13E21.exe 95 PID 4616 wrote to memory of 3208 4616 7D57AD13E21.exe 95 PID 4616 wrote to memory of 3208 4616 7D57AD13E21.exe 95 PID 4616 wrote to memory of 3208 4616 7D57AD13E21.exe 95 PID 4616 wrote to memory of 3208 4616 7D57AD13E21.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe"C:\Users\Admin\AppData\Local\Temp\5f693ba5d436e4ef2f3cc6ba480043c288133b8d232ee691dfd155584c0e2f59.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe" /f2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:228
-
-
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"C:\Users\Admin\AppData\Roaming\7D57AD13E21.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3208
-
-
-
C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"C:\Users\Admin\AppData\Roaming\Scegli_nome_allegato.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1280
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.9MB
MD587b0c60d172407fd55e1ed5046f3c8d0
SHA117e347b055fd86fbb248d1a774356eb2ac935280
SHA256d9baea697d01a47838becaf362a2c6e245aa95385c1ae5fbf75febecdf069204
SHA512fa5994454d6f09a4fe50abf92866287877bcc944fd1b149c59c470ca613a21c7aed1ffef620c1dff09f66cb9d1d806eca850c373b11e6b47f785a8a1dc5f141c
-
Filesize
1.0MB
MD5a2f259ceb892d3b0d1d121997c8927e3
SHA16e0a7239822b8d365d690a314f231286355f6cc6
SHA256ab01a333f38605cbcebd80e0a84ffae2803a9b4f6bebb1e9f773e949a87cb420
SHA5125ae1b60390c94c9e79d3b500a55b775d82556e599963d533170b9f35ad5cfa2df1b7d24de1890acf8e1e2c356830396091d46632dbc6ee43a7d042d4facb5dad