Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2023, 16:58
Static task
static1
Behavioral task
behavioral1
Sample
40a0682397545bexeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
40a0682397545bexeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
40a0682397545bexeexeexeex.exe
-
Size
31KB
-
MD5
40a0682397545ba8ffdd38bfbc635ed2
-
SHA1
2470259827feed24caa18564f3a99bb041c0a9c9
-
SHA256
82bc2a1d9565777f67b7f0428c059b0870465abe47aa59f067ce8414fca9ba76
-
SHA512
9c5598ac89d46c27f4feaa9b56c7e4b8a59bd320a95e38061449a972b8b716d116cc0ce2c2402431bd5977a0eafe42e68da3de0ae4eca10ae63403f19614510f
-
SSDEEP
384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzogFzpjum:bAvJCYOOvbRPDEgXVFzpCm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation 40a0682397545bexeexeexeex.exe Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation demka.exe -
Executes dropped EXE 1 IoCs
pid Process 1320 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4808 wrote to memory of 1320 4808 40a0682397545bexeexeexeex.exe 83 PID 4808 wrote to memory of 1320 4808 40a0682397545bexeexeexeex.exe 83 PID 4808 wrote to memory of 1320 4808 40a0682397545bexeexeexeex.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\40a0682397545bexeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\40a0682397545bexeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
PID:1320
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD59f4c6ca9ff366bbe49c167acdc6202f4
SHA1a7367cf12cc645b110f33b7b91a32a7235f15a19
SHA2566cf2f2f518258b2ea5fbb0f6fb4f5f03d4685ba3442589c481c92e20326243ef
SHA512344b0c228fbafb55589649c4c8bc69a91210f04bb8f026881ffbecdd487d94d546ee8a9092db60739b892b361a023c94cb63a65ee4bff449794da44302ed2f91
-
Filesize
31KB
MD59f4c6ca9ff366bbe49c167acdc6202f4
SHA1a7367cf12cc645b110f33b7b91a32a7235f15a19
SHA2566cf2f2f518258b2ea5fbb0f6fb4f5f03d4685ba3442589c481c92e20326243ef
SHA512344b0c228fbafb55589649c4c8bc69a91210f04bb8f026881ffbecdd487d94d546ee8a9092db60739b892b361a023c94cb63a65ee4bff449794da44302ed2f91
-
Filesize
31KB
MD59f4c6ca9ff366bbe49c167acdc6202f4
SHA1a7367cf12cc645b110f33b7b91a32a7235f15a19
SHA2566cf2f2f518258b2ea5fbb0f6fb4f5f03d4685ba3442589c481c92e20326243ef
SHA512344b0c228fbafb55589649c4c8bc69a91210f04bb8f026881ffbecdd487d94d546ee8a9092db60739b892b361a023c94cb63a65ee4bff449794da44302ed2f91