Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 08:43
Static task
static1
Behavioral task
behavioral1
Sample
f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe
Resource
win10v2004-20241007-en
General
-
Target
f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe
-
Size
78KB
-
MD5
769bedaefa73efbdbb4a456f208a4250
-
SHA1
345afffc48e5dcd99c97e6781d19bd679b033304
-
SHA256
f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2
-
SHA512
4e726cd3e0954ca61314f5b12105da94eefb5d130fa5e0444a2d824968e9c164aa31aba29f8083bf174f4b3b8c3e71ca5b0f49ab4f1ee72db2d7381c24ddc676
-
SSDEEP
1536:rBWV58UAlGmWw644txVILJtcfJuovFdPKmNqOqD70Gou2P2oYe9Qtt60m9/E1qv:tWV58UAtWDDILJLovbicqOq3o+nE9/l
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe -
Executes dropped EXE 1 IoCs
pid Process 5016 tmpB91E.tmp.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\caspol.exe = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\InstallMembership.exe\"" tmpB91E.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpB91E.tmp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4904 f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe Token: SeDebugPrivilege 5016 tmpB91E.tmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4904 wrote to memory of 2568 4904 f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe 82 PID 4904 wrote to memory of 2568 4904 f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe 82 PID 4904 wrote to memory of 2568 4904 f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe 82 PID 2568 wrote to memory of 4836 2568 vbc.exe 84 PID 2568 wrote to memory of 4836 2568 vbc.exe 84 PID 2568 wrote to memory of 4836 2568 vbc.exe 84 PID 4904 wrote to memory of 5016 4904 f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe 85 PID 4904 wrote to memory of 5016 4904 f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe 85 PID 4904 wrote to memory of 5016 4904 f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe"C:\Users\Admin\AppData\Local\Temp\f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /noconfig @"C:\Users\Admin\AppData\Local\Temp\hfwzlc-v.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESBA67.tmp" "C:\Users\Admin\AppData\Local\Temp\vbc334B18CDE19D4066B1E37FEF1ECD2E0.TMP"3⤵
- System Location Discovery: System Language Discovery
PID:4836
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmpB91E.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpB91E.tmp.exe" C:\Users\Admin\AppData\Local\Temp\f5cc521574d00c38ce2f211e49c2cacd36a177b04a0cadc0d65c8d2ec9ba71f2N.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5016
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5667c1feb93bdc832a52e0710b17ef8a0
SHA14e709f98b7ea74064f94dec94a9b5941eb75a3ed
SHA2561953ff6c1197bf490c08ded0f1f30b9e24af406c9f47fbc19a261488dd742bb7
SHA512901fbe705057f8c81a21947550a598df08833290b836bf1b1b755a34a15cc8bb72f7812b4317b16cdfff5415e03ca4976de292b6f9ac238ba6727edacfc06bdb
-
Filesize
14KB
MD57ab432dd2348e17357ddc0dd53977d84
SHA11e0479ff182c25b8c15011d681b23ad09eff379c
SHA256ed9dbb4c94b97b67e58e38195fb998ce4ffd3cc41c480c0b5ff7dddf864490f8
SHA512f66ca09b50d3ee2b82d557e7329ee5fed1a57b697f7798ed13e55a19cf82ef555b5881b0dcdb1c126d2262d1edd41279c6d6dae904f3cacc6bf17fe3324faefb
-
Filesize
266B
MD5fb11a5d89ce5494cb7b8b449822a81a9
SHA1dbf4e92e315e99f5d1e3fe3fd5731c31d5c6d89a
SHA256e2919f0d4b218c155ab91cfffcc2e93a4352c2a99842f76fe01b18382af18566
SHA512da14f1ee10024c17216efb5489c3ca59a64379ec593c2527a3d7255194347f034998000e152a3b9597d0ac20d45dfffed44d18c9f6fc469708004c90dca05b14
-
Filesize
78KB
MD560e6f3804fc8f605b1d8f7a29c9ae8d2
SHA1bcae475dc265144de2c03fb9a626a082ce99d24f
SHA256eab6c8ca1933dbda715f21322dc8233513538f70805377aad38dd9d05f68f13f
SHA512fd7491a4df463b2d7fb66c1bac8113da89987929d1b4084d2b737f9da96f344ad63df6a990ccad5191cb1db6784ab0ccdcdb6db1646562996d4803d86d4b2a6f
-
Filesize
660B
MD5fabc32497fc0eae4f2fe44ba421d1ef7
SHA1120342f353ae6d7cfebcccd18b8779878a0e72cf
SHA2566e0d39f3d0e764f3305d7fab4ae353a8f13b1d01b3b7ba9e39d4693619d40876
SHA512d0ed7fb5537203e74adb0ec94faf4b1d80bd45bc425fd4461fe60f9c220574cda75ff07f4cc7e3a1bef49716577a8575eef76d04ce387110e410fad1fecc2624
-
Filesize
62KB
MD5a26b0f78faa3881bb6307a944b096e91
SHA142b01830723bf07d14f3086fa83c4f74f5649368
SHA256b43ecda931e7af03f0768c905ed9fa82c03e41e566b1dff9960afc6b91ae5ab5
SHA512a0e9c2814fca6bcf87e779592c005d7a8eef058a61f5a5443f7cf8d97e2316d0cde91ed51270bbcc23ccf68c7fc4a321a5a95a4eed75cb8d8a45cb3aa725fb9c