Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08-07-2023 11:10
Static task
static1
Behavioral task
behavioral1
Sample
753a4ae0bfe8d4exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
753a4ae0bfe8d4exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
753a4ae0bfe8d4exeexeexeex.exe
-
Size
46KB
-
MD5
753a4ae0bfe8d4b525420ad23151c9f3
-
SHA1
f1a9097c21952b86179f1f81598fe093fbe22e84
-
SHA256
859c104baa50887e96b0170dcc6cf069fb09e0fd280ad7b9616fffe383393f82
-
SHA512
743ca2cddfc3f5d54524ec32120da7356e0104b2326fcf8a42251ae0ac42770fde458ac59e720e0e979028db13ea5f621745bc1c78587f5982d9eb52fbcff059
-
SSDEEP
768:bIDOw9UiaCHfjnE0Sfa7ilR0p9u6p4Uu6EIZPm8h:bIDOw9a0DwitDwIZbh
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation 753a4ae0bfe8d4exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 4676 lossy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3120 wrote to memory of 4676 3120 753a4ae0bfe8d4exeexeexeex.exe 87 PID 3120 wrote to memory of 4676 3120 753a4ae0bfe8d4exeexeexeex.exe 87 PID 3120 wrote to memory of 4676 3120 753a4ae0bfe8d4exeexeexeex.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\753a4ae0bfe8d4exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\753a4ae0bfe8d4exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:4676
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD548c366f9abb00fe6dae5e929eff662d4
SHA1ef76bb14bb3675ef04fa928e1b31064286c7306b
SHA2567909e27a351f213f1132fc050e7e3fd3b1540b8d8d6f38974cf72dc5ddb4b2f4
SHA512d27a792f7e3ae1a3717e1d50ea219a60552b11f9b9cb4e8f7c1c9e78c0802fec4bbdd31215376fca954266d4f80cc2fdd498f6d333f6225de5c088d3de5b0d6c
-
Filesize
47KB
MD548c366f9abb00fe6dae5e929eff662d4
SHA1ef76bb14bb3675ef04fa928e1b31064286c7306b
SHA2567909e27a351f213f1132fc050e7e3fd3b1540b8d8d6f38974cf72dc5ddb4b2f4
SHA512d27a792f7e3ae1a3717e1d50ea219a60552b11f9b9cb4e8f7c1c9e78c0802fec4bbdd31215376fca954266d4f80cc2fdd498f6d333f6225de5c088d3de5b0d6c
-
Filesize
47KB
MD548c366f9abb00fe6dae5e929eff662d4
SHA1ef76bb14bb3675ef04fa928e1b31064286c7306b
SHA2567909e27a351f213f1132fc050e7e3fd3b1540b8d8d6f38974cf72dc5ddb4b2f4
SHA512d27a792f7e3ae1a3717e1d50ea219a60552b11f9b9cb4e8f7c1c9e78c0802fec4bbdd31215376fca954266d4f80cc2fdd498f6d333f6225de5c088d3de5b0d6c