Analysis
-
max time kernel
148s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
09/07/2023, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
bd8f660ddd0e15exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
bd8f660ddd0e15exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
bd8f660ddd0e15exeexeexeex.exe
-
Size
35KB
-
MD5
bd8f660ddd0e15a97782c2583a389263
-
SHA1
861b3ea36841878ed2187eb78b892967b229367b
-
SHA256
4373efbf99afd99cbace1725912c7e045cc686872ec609df9df299108ba863cf
-
SHA512
de866b59995804b9dcdc38f7301611812bfb81b83098b40b0b867c9b30ab82768c95900b5aec548258117da0a7c92b1379367a932109ec7fa5c10f2fd2870c32
-
SSDEEP
384:bgX4uGLLQRcsdeQ7/nQu63Ag7YmecFanrlwfjDUkKDfWf6XT+72DxLE:bgX4zYcgTEu6QOaryfjqDlC76LE
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4176143399-3250363947-192774652-1000\Control Panel\International\Geo\Nation bd8f660ddd0e15exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 740 hasfj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1784 wrote to memory of 740 1784 bd8f660ddd0e15exeexeexeex.exe 84 PID 1784 wrote to memory of 740 1784 bd8f660ddd0e15exeexeexeex.exe 84 PID 1784 wrote to memory of 740 1784 bd8f660ddd0e15exeexeexeex.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\bd8f660ddd0e15exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\bd8f660ddd0e15exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\hasfj.exe"C:\Users\Admin\AppData\Local\Temp\hasfj.exe"2⤵
- Executes dropped EXE
PID:740
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD50dc3502ebf5d839dae8f8b44086c9a2f
SHA1ea8b221dbfc60b78835f0bdae6de353e0e064a37
SHA256acf3331098a7ffbf643e57020589a6fbe6126d64f542adf6f1e9be7cd95db5ad
SHA5128294820a3d22761e37239a9cd5227fbbbc62122f09f18fc355318ef9d8f03a7fae84044658f6bcb7d9673aa2094b3d6c4eb738c5460beecb84e044f9f134e754
-
Filesize
35KB
MD50dc3502ebf5d839dae8f8b44086c9a2f
SHA1ea8b221dbfc60b78835f0bdae6de353e0e064a37
SHA256acf3331098a7ffbf643e57020589a6fbe6126d64f542adf6f1e9be7cd95db5ad
SHA5128294820a3d22761e37239a9cd5227fbbbc62122f09f18fc355318ef9d8f03a7fae84044658f6bcb7d9673aa2094b3d6c4eb738c5460beecb84e044f9f134e754
-
Filesize
35KB
MD50dc3502ebf5d839dae8f8b44086c9a2f
SHA1ea8b221dbfc60b78835f0bdae6de353e0e064a37
SHA256acf3331098a7ffbf643e57020589a6fbe6126d64f542adf6f1e9be7cd95db5ad
SHA5128294820a3d22761e37239a9cd5227fbbbc62122f09f18fc355318ef9d8f03a7fae84044658f6bcb7d9673aa2094b3d6c4eb738c5460beecb84e044f9f134e754