Analysis
-
max time kernel
94s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 12:17
Static task
static1
Behavioral task
behavioral1
Sample
ЦИТАТА.exe
Resource
win7-20240903-en
General
-
Target
ЦИТАТА.exe
-
Size
676KB
-
MD5
57d485ab07368d3d7fbd1b62b8bb6a5f
-
SHA1
15749ab51781854689d73a7f7a94d6052546fa9a
-
SHA256
2efd54686c3942f7778ae4ad63c002e50d1fd2a08fac36ac770dff40cb3e3788
-
SHA512
7abdbfad7c6ba7956b580c6656d4224ac5023c6df7754a35025bd82b6190f543cd35bf220e3130070799599b10b7b017e2a262d971fab29dd62e2c372a4b6118
-
SSDEEP
12288:vrOd+Ri3AgFd13C1/CYU0EY5ZLl2YFye+JwP78lprlDfB:tQ3Ag13EKx0BR+2YlppD5
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2932 powershell.exe 4016 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation ЦИТАТА.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1836 3508 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ЦИТАТА.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4320 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3508 ЦИТАТА.exe 2932 powershell.exe 4016 powershell.exe 3508 ЦИТАТА.exe 3508 ЦИТАТА.exe 4016 powershell.exe 2932 powershell.exe 3508 ЦИТАТА.exe 3508 ЦИТАТА.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3508 ЦИТАТА.exe Token: SeDebugPrivilege 2932 powershell.exe Token: SeDebugPrivilege 4016 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3508 wrote to memory of 2932 3508 ЦИТАТА.exe 89 PID 3508 wrote to memory of 2932 3508 ЦИТАТА.exe 89 PID 3508 wrote to memory of 2932 3508 ЦИТАТА.exe 89 PID 3508 wrote to memory of 4016 3508 ЦИТАТА.exe 91 PID 3508 wrote to memory of 4016 3508 ЦИТАТА.exe 91 PID 3508 wrote to memory of 4016 3508 ЦИТАТА.exe 91 PID 3508 wrote to memory of 4320 3508 ЦИТАТА.exe 93 PID 3508 wrote to memory of 4320 3508 ЦИТАТА.exe 93 PID 3508 wrote to memory of 4320 3508 ЦИТАТА.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\ЦИТАТА.exe"C:\Users\Admin\AppData\Local\Temp\ЦИТАТА.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\ЦИТАТА.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2932
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\tOaFoZLjud.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4016
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\tOaFoZLjud" /XML "C:\Users\Admin\AppData\Local\Temp\tmpDEE6.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3508 -s 12122⤵
- Program crash
PID:1836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3508 -ip 35081⤵PID:840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD53d086a433708053f9bf9523e1d87a4e8
SHA1b3ab5d4f282a4c8fe8c3005b8a557ed5a0e37f28
SHA2566f8fd1b8d9788ad54eaeee329232187e24b7b43393a01aeba2d6e9675231fb69
SHA512931ae42b4c68a4507ff2342332b08eb407050d47cf4176137ea022d0f6e513c689e998445a04c6d18d4877391705c586bfce0234632b898d41aaed0957996dfd
-
Filesize
18KB
MD56c5b0659936be4c05497af7a53242cba
SHA1db0fe77d0a7b8464f4b7693dd0d9fce97350ead8
SHA256dc0079e357fec50d6d770988ffcf230c3d10aeabff642cd8708156169ede2fe6
SHA512a3caa30822be93e27147e0d89f3bf6f793e096858d904dfe6d71645e7318768231c36fe191e310fa15bf7c2b18b82f4c3f3c168d457f9caac79674f2c384a890
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5e222d277168cfcbcd7a026330899424f
SHA12e49814d05f2c6ba628c56ab55e100e00abcec02
SHA25638452cb3d3ef0ac50c435bba19e5172e67cbdcf1cd2dd70e642b7dc349f525e3
SHA51296eb0b0960036a794a95a15fb2f294f2322fb13a8b014ec7a385552fc5db672d8382dfdf09661fee8fb92b17b0705e77ab5fe9900cc52e4805c5c82c85a59737