Analysis
-
max time kernel
43s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-12-2024 16:45
Behavioral task
behavioral1
Sample
a.exe
Resource
win10v2004-20241007-en
General
-
Target
a.exe
-
Size
165KB
-
MD5
ab291dfdae1f44bd81ec75de9dd657d6
-
SHA1
3cfca0456d8037e9759bce00991bd06d6dab8c86
-
SHA256
578bd705fdf85e864f09780e885c2a04305a719038b66b2ff5639bf2572600de
-
SHA512
71239480308c81ff5f4cde60cb54d05e37cb966ed276dd01cd70536728474d5f412aada83504890c065b6e34ff354fc5920f12b9ccd9a11875711fcffffc5cea
-
SSDEEP
3072:fP8VpD/T68Q8wsWMS1kDGo/JzlJCFEw2iNb0Zr15bO:fP8V2f1k7/JBYW/ebmO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation a.exe -
Executes dropped EXE 1 IoCs
pid Process 3916 x64dbg.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\x64dbg.exe = "\"C:\\Windows\\x64dbg.exe\" .." x64dbg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\x64dbg.exe = "\"C:\\Windows\\x64dbg.exe\" .." x64dbg.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\x64dbg.exe a.exe File opened for modification C:\Windows\x64dbg.exe x64dbg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language x64dbg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1136 schtasks.exe 1860 schtasks.exe 3804 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3916 x64dbg.exe Token: 33 3916 x64dbg.exe Token: SeIncBasePriorityPrivilege 3916 x64dbg.exe Token: 33 3916 x64dbg.exe Token: SeIncBasePriorityPrivilege 3916 x64dbg.exe Token: 33 3916 x64dbg.exe Token: SeIncBasePriorityPrivilege 3916 x64dbg.exe Token: 33 3916 x64dbg.exe Token: SeIncBasePriorityPrivilege 3916 x64dbg.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2304 wrote to memory of 3196 2304 a.exe 82 PID 2304 wrote to memory of 3196 2304 a.exe 82 PID 2304 wrote to memory of 3196 2304 a.exe 82 PID 2304 wrote to memory of 1136 2304 a.exe 84 PID 2304 wrote to memory of 1136 2304 a.exe 84 PID 2304 wrote to memory of 1136 2304 a.exe 84 PID 2172 wrote to memory of 5044 2172 a.exe 88 PID 2172 wrote to memory of 5044 2172 a.exe 88 PID 2172 wrote to memory of 5044 2172 a.exe 88 PID 2172 wrote to memory of 1860 2172 a.exe 90 PID 2172 wrote to memory of 1860 2172 a.exe 90 PID 2172 wrote to memory of 1860 2172 a.exe 90 PID 2304 wrote to memory of 3916 2304 a.exe 92 PID 2304 wrote to memory of 3916 2304 a.exe 92 PID 2304 wrote to memory of 3916 2304 a.exe 92 PID 3916 wrote to memory of 1444 3916 x64dbg.exe 93 PID 3916 wrote to memory of 1444 3916 x64dbg.exe 93 PID 3916 wrote to memory of 1444 3916 x64dbg.exe 93 PID 3916 wrote to memory of 3804 3916 x64dbg.exe 95 PID 3916 wrote to memory of 3804 3916 x64dbg.exe 95 PID 3916 wrote to memory of 3804 3916 x64dbg.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
- System Location Discovery: System Language Discovery
PID:3196
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\a.exe" /sc minute /mo 12⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1136
-
-
C:\Windows\x64dbg.exe"C:\Windows\x64dbg.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵
- System Location Discovery: System Language Discovery
PID:1444
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Windows\x64dbg.exe" /sc minute /mo 13⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3804
-
-
-
C:\Users\Admin\AppData\Local\Temp\a.exeC:\Users\Admin\AppData\Local\Temp\a.exe1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
- System Location Discovery: System Language Discovery
PID:5044
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\a.exe" /sc minute /mo 12⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1860
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
408B
MD540b0c3caa1b14a4c83e8475c46bf2016
SHA1af9575cda4d842f028d18b17063796a894ecd9d0
SHA25670e88a428d92b6ab5905dac9f324824c4c6f120bc3f385c82b2d12f707a4a867
SHA512916437df737de4b6063b7116b4d148229d4a975eb4046122d47434b81fba06e88e09e5f273ec496c81ef3feecb843ccad20a7a04074224416c1fa9951acbdac7
-
Filesize
165KB
MD5ab291dfdae1f44bd81ec75de9dd657d6
SHA13cfca0456d8037e9759bce00991bd06d6dab8c86
SHA256578bd705fdf85e864f09780e885c2a04305a719038b66b2ff5639bf2572600de
SHA51271239480308c81ff5f4cde60cb54d05e37cb966ed276dd01cd70536728474d5f412aada83504890c065b6e34ff354fc5920f12b9ccd9a11875711fcffffc5cea