Analysis
-
max time kernel
141s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 10:59
Static task
static1
Behavioral task
behavioral1
Sample
0ec5016bb7e5e945f7a736c2f3f12245.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0ec5016bb7e5e945f7a736c2f3f12245.exe
Resource
win10v2004-20231215-en
General
-
Target
0ec5016bb7e5e945f7a736c2f3f12245.exe
-
Size
15KB
-
MD5
0ec5016bb7e5e945f7a736c2f3f12245
-
SHA1
84f7c191fe189c4c9f6dc49450ecb879801cc4db
-
SHA256
ff0802a36a19e0e1f5fcd98ab67899ab13f6d9feacc08ab9356102417ab5d425
-
SHA512
1293b7f40e20aecf29715f4e59178d0f43c3eaad64fa15478b1e25a150496a0d226e2b70dd8599fb13e167c01603cb7b6af17df85e636de64ed4ad41ee81f2ed
-
SSDEEP
192:8RAj9GnwR2MxJidHq+XOzN0nLzns66Rzwk5frT/kc1GS:VcnwR2MxJitq+XOzNt66Vwk9T/kc1GS
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-635608581-3370340891-292606865-1000\Control Panel\International\Geo\Nation 0ec5016bb7e5e945f7a736c2f3f12245.exe -
Executes dropped EXE 1 IoCs
pid Process 4676 hromi.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1348 wrote to memory of 4676 1348 0ec5016bb7e5e945f7a736c2f3f12245.exe 89 PID 1348 wrote to memory of 4676 1348 0ec5016bb7e5e945f7a736c2f3f12245.exe 89 PID 1348 wrote to memory of 4676 1348 0ec5016bb7e5e945f7a736c2f3f12245.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\0ec5016bb7e5e945f7a736c2f3f12245.exe"C:\Users\Admin\AppData\Local\Temp\0ec5016bb7e5e945f7a736c2f3f12245.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\hromi.exe"C:\Users\Admin\AppData\Local\Temp\hromi.exe"2⤵
- Executes dropped EXE
PID:4676
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD501cbd4104df906ae3ca6f64f8f26b4eb
SHA1cdc67d58b419ff1622099a06d6ccf34d88b6810d
SHA25667a9ba82752eb256552fcc7d27c95ad421dcd76914d214d1fb54b82752186439
SHA5121aab7d368984e1d6ac9c0b68618e75d8a6c75d82a76b0d4ad95a167f916c741333446ff9b27d983f143794086129951b1aaa94c47d78492ecdcb2a3e1047f1e4