Resubmissions
27/03/2025, 13:47
250327-q3kjqasxct 10Analysis
-
max time kernel
3s -
max time network
6s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 13:47
Behavioral task
behavioral1
Sample
WinAuthx32.exe
Resource
win10v2004-20250314-en
General
-
Target
WinAuthx32.exe
-
Size
1.1MB
-
MD5
d2f9a2c6cecae6184fd12f0fca835433
-
SHA1
81030ac06f16d76cb4204963923cdf2f27913714
-
SHA256
291d5441b266bfbd219043a3b9ac484525e79911792fba2d8401cba0207d9d0e
-
SHA512
93392e8c1f7fb5b1e3cfab92ec1eceee3eabc3db73eadcbfb9c0cc2bef87ea5fb0f035c389b7af243df9020673156b0473cb6edc8d5c71ce3e9c4e2110e08150
-
SSDEEP
24576:u2G/nvxW3WieCqgt5UOOs7sxXfmRm+vBhx5dv:ubA3j75JsK3x3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000\Control Panel\International\Geo\Nation WinAuthx32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinAuthx32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-308834014-1004923324-1191300197-1000_Classes\Local Settings WinAuthx32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4352 wrote to memory of 5344 4352 WinAuthx32.exe 87 PID 4352 wrote to memory of 5344 4352 WinAuthx32.exe 87 PID 4352 wrote to memory of 5344 4352 WinAuthx32.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\WinAuthx32.exe"C:\Users\Admin\AppData\Local\Temp\WinAuthx32.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Surrogatewinhostmonitordhcp\wxRxOc10fSIm2kfzTZ.vbe"2⤵
- System Location Discovery: System Language Discovery
PID:5344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
226B
MD55ffd41cbec6a6d6a0ff79804df9e1e57
SHA1b62f9545777a908b0b2134ebccae0ee788eb52d3
SHA256c597e507bc0d72d57996850f3a8cd97b986fe032e1e1affb7789a4c00dd52e6d
SHA512027da94ebd9b00790caa297bee9d2a5fc7156a9f2cae9866a5ddd3178eb344b20b3922ac78b693901e75ae4be9033459deba0f9a60154d826e13d1cb056f26fa