Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
11-07-2023 13:04
Static task
static1
Behavioral task
behavioral1
Sample
f549d968bc3046exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
f549d968bc3046exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
f549d968bc3046exeexeexeex.exe
-
Size
26KB
-
MD5
f549d968bc30461f01763ced3259d8e1
-
SHA1
d2b492915e8cfc4ff703fbd8a8f9d745b1fe0d7d
-
SHA256
aba0f0ea5d5e61b5f00e3fc89a0e2d7b35818ba95d01757ce67b32a54960d6c1
-
SHA512
71290cb1a310220f2e6a51e1f9f763b488d78dcbb66f90d9cc252dcd8a2ed9ae9bd9f6f16ca250de8f2386c5946ac20847ac6779d3747c50eef5f0d9768e69e7
-
SSDEEP
384:bIDl1ovmXAw9PMDREhi9OUSPlRxMc/cip7IAfjDb4YeNI8WxD:bIDOw9UiaCHfjnMNjGD
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1420546310-613437930-2990200354-1000\Control Panel\International\Geo\Nation f549d968bc3046exeexeexeex.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 lossy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4964 wrote to memory of 2192 4964 f549d968bc3046exeexeexeex.exe 86 PID 4964 wrote to memory of 2192 4964 f549d968bc3046exeexeexeex.exe 86 PID 4964 wrote to memory of 2192 4964 f549d968bc3046exeexeexeex.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f549d968bc3046exeexeexeex.exe"C:\Users\Admin\AppData\Local\Temp\f549d968bc3046exeexeexeex.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\lossy.exe"C:\Users\Admin\AppData\Local\Temp\lossy.exe"2⤵
- Executes dropped EXE
PID:2192
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD525aad8837590b831f7d9446c0c10c741
SHA1dfeb230c0c90120040ef4caca48fc7c9092b8b1a
SHA256e592a50b9b0f2cf150b8e94158ef9ed46d00278b9cc0002cb3867957a7fb7e21
SHA51298732f5622b3a7139207da70b9ac4fe427ca46e52d797dae1ce3d1ac825b5bb53287b9853da74b083c516767da4f98ee259b060ff4049a84dfe843d03d8e53c3
-
Filesize
26KB
MD525aad8837590b831f7d9446c0c10c741
SHA1dfeb230c0c90120040ef4caca48fc7c9092b8b1a
SHA256e592a50b9b0f2cf150b8e94158ef9ed46d00278b9cc0002cb3867957a7fb7e21
SHA51298732f5622b3a7139207da70b9ac4fe427ca46e52d797dae1ce3d1ac825b5bb53287b9853da74b083c516767da4f98ee259b060ff4049a84dfe843d03d8e53c3
-
Filesize
26KB
MD525aad8837590b831f7d9446c0c10c741
SHA1dfeb230c0c90120040ef4caca48fc7c9092b8b1a
SHA256e592a50b9b0f2cf150b8e94158ef9ed46d00278b9cc0002cb3867957a7fb7e21
SHA51298732f5622b3a7139207da70b9ac4fe427ca46e52d797dae1ce3d1ac825b5bb53287b9853da74b083c516767da4f98ee259b060ff4049a84dfe843d03d8e53c3