Analysis
-
max time kernel
102s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
28/03/2025, 06:19
Behavioral task
behavioral1
Sample
d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe
Resource
win7-20241010-en
General
-
Target
d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe
-
Size
1.2MB
-
MD5
1baec6d7060612f84b52928359569ecb
-
SHA1
f28bdb46468d3715f777e5963287c0ca9ecee36f
-
SHA256
d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5
-
SHA512
05d030238b5235db5cf2a86cca7d22263372a9bb6c3076a19ff6d9d014dae5fa1e8a10a4aee84220a99f94042b47a0186e0cb44d7d3d8de97e61d098246ab046
-
SSDEEP
24576:toaQk9HHhLzdok75ns9nyz5F5hojqxzRJJ0+6t:tojkJBLz6ktns985F5hbx1JJYt
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\cEpXNW8CkG.sys d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe File opened for modification C:\Windows\SysWOW64\drivers\FoWevxdLgbQiHx.wln d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe -
Unexpected DNS network traffic destination 3 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description flow ioc pid Process Destination IP 5 114.114.114.114 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe Destination IP 40 114.114.114.114 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe Destination IP 111 114.114.114.114 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe -
resource yara_rule behavioral2/memory/6036-0-0x0000000000800000-0x000000000093F000-memory.dmp vmprotect behavioral2/memory/6036-2-0x0000000000800000-0x000000000093F000-memory.dmp vmprotect behavioral2/files/0x00070000000242a2-13.dat vmprotect behavioral2/memory/6036-39-0x0000000000800000-0x000000000093F000-memory.dmp vmprotect behavioral2/memory/6036-40-0x0000000000800000-0x000000000093F000-memory.dmp vmprotect -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\7q1vQj59zk.sys d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe File opened for modification C:\Windows\SysWOW64\Fz2dgYcL1i.muf d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\fD92VE4VZX.wyx d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe File opened for modification C:\Program Files\sK3v4nsmhHTw.sys d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe File opened for modification C:\Program Files\MTs8jfJxlldY.baf d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe File opened for modification C:\Program Files (x86)\b6CSqg8DDjCv.sys d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\GQ3jQ8saFB9X.sys d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe File opened for modification C:\Windows\DMIOEWJw4Ol.pil d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language timeout.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 3052 timeout.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe -
Suspicious behavior: LoadsDriver 14 IoCs
pid Process 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found 652 Process not Found -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe Token: SeTcbPrivilege 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe Token: SeIncBasePriorityPrivilege 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 6036 wrote to memory of 3000 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe 114 PID 6036 wrote to memory of 3000 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe 114 PID 6036 wrote to memory of 3000 6036 d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe 114 PID 3000 wrote to memory of 3052 3000 cmd.exe 116 PID 3000 wrote to memory of 3052 3000 cmd.exe 116 PID 3000 wrote to memory of 3052 3000 cmd.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe"C:\Users\Admin\AppData\Local\Temp\d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Unexpected DNS network traffic destination
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:6036 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c timeout /t 1 & del /Q /F "C:\Users\Admin\AppData\Local\Temp\d1918c8e7c4c732ce1af2d275d3024038131d02cbc5d6db1c3ca679ece5e8bf5.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\timeout.exetimeout /t 13⤵
- System Location Discovery: System Language Discovery
- Delays execution with timeout.exe
PID:3052
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5b78512a09b506b7af9ea08d64ff16e08
SHA1e6b79ac77ca72cacdcd1556e29af0fe949bfd89f
SHA25691bd0ecb80d5ce3fafda7bda4a092f7beefff012f07c458a0056ca6363e7e3b1
SHA512ea19f980269995f399a949ebd5e2dbde3dcd6b203e911dc1718e6223973540c44ffc82781ff3434448b5ae5f9367e115c98f5e904e46f5512cd8e0f44ab62d6d