Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
08/07/2023, 17:45
Static task
static1
Behavioral task
behavioral1
Sample
97446377168211exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
97446377168211exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
97446377168211exeexeexeex.exe
-
Size
31KB
-
MD5
9744637716821173b405ccf700e4425f
-
SHA1
c59394c41bc9060b4e899ead1dc0c32016884d8a
-
SHA256
36a31af3fbee43522fbf6a4aea740de46e1645133add8918bf1f31e98208f04b
-
SHA512
f37b51a7cc81b56a477435201c2093cd22845e97a01897797a85e0ffd8f6dfc9f9aaee6872c3693417fa3071197172c9554a381217814ea8a857f2d522c4b0e3
-
SSDEEP
384:bAvMaNGh4z7CG3POOvbRSLoF/F0QU5XYFnufc/zzogFzpju3FXobM:bAvJCYOOvbRPDEgXVFzpC3FXog
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-618519468-4027732583-1827558364-1000\Control Panel\International\Geo\Nation 97446377168211exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 4936 demka.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2864 wrote to memory of 4936 2864 97446377168211exeexeexeex.exe 84 PID 2864 wrote to memory of 4936 2864 97446377168211exeexeexeex.exe 84 PID 2864 wrote to memory of 4936 2864 97446377168211exeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\97446377168211exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\97446377168211exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\demka.exe"C:\Users\Admin\AppData\Local\Temp\demka.exe"2⤵
- Executes dropped EXE
PID:4936
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31KB
MD5fbec228140bd2fa1c21a646918e9029e
SHA1a047128207be40065113a2933f5c79c13b65ab5e
SHA2561cdfe940435a8145fc5166a00632b33fc060e54baecaf7665c14565ee5f42c0c
SHA512775240aac435cd8698fde8f8c82a720a6ea3291ed321a3c07dd72b19ff735451d612df4c3f2aae496a7116e28405a8c8388a6ca0ec177fe830247a48b748f28f
-
Filesize
31KB
MD5fbec228140bd2fa1c21a646918e9029e
SHA1a047128207be40065113a2933f5c79c13b65ab5e
SHA2561cdfe940435a8145fc5166a00632b33fc060e54baecaf7665c14565ee5f42c0c
SHA512775240aac435cd8698fde8f8c82a720a6ea3291ed321a3c07dd72b19ff735451d612df4c3f2aae496a7116e28405a8c8388a6ca0ec177fe830247a48b748f28f
-
Filesize
31KB
MD5fbec228140bd2fa1c21a646918e9029e
SHA1a047128207be40065113a2933f5c79c13b65ab5e
SHA2561cdfe940435a8145fc5166a00632b33fc060e54baecaf7665c14565ee5f42c0c
SHA512775240aac435cd8698fde8f8c82a720a6ea3291ed321a3c07dd72b19ff735451d612df4c3f2aae496a7116e28405a8c8388a6ca0ec177fe830247a48b748f28f