Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 11:06
Static task
static1
Behavioral task
behavioral1
Sample
1009ea531d3d797473a9dc83253ccbae.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1009ea531d3d797473a9dc83253ccbae.exe
Resource
win10v2004-20231215-en
General
-
Target
1009ea531d3d797473a9dc83253ccbae.exe
-
Size
14KB
-
MD5
1009ea531d3d797473a9dc83253ccbae
-
SHA1
9a71c4e1ee8985e31daf199c0949ea5f04029e72
-
SHA256
ef0c9f16b25112683141dfb647fe35ff5889a432070769fb0ec9893f20828180
-
SHA512
60e651930504f3d3fec18ce1f89a105a02bce3785e4fd6cdc923e4d06916bd298bcaa24198e0d73e535819354fa90d6754aa4e1ebcd4d6d6c53a673040a2ba29
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4Yh4cU:hDXWipuE+K3/SSHgx8
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation 1009ea531d3d797473a9dc83253ccbae.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation DEM3BC1.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation DEM926C.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation DEME8BA.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation DEM3EE8.exe Key value queried \REGISTRY\USER\S-1-5-21-1497073144-2389943819-3385106915-1000\Control Panel\International\Geo\Nation DEM94E8.exe -
Executes dropped EXE 6 IoCs
pid Process 4508 DEM3BC1.exe 572 DEM926C.exe 3204 DEME8BA.exe 564 DEM3EE8.exe 2212 DEM94E8.exe 2288 DEMEB17.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3352 wrote to memory of 4508 3352 1009ea531d3d797473a9dc83253ccbae.exe 97 PID 3352 wrote to memory of 4508 3352 1009ea531d3d797473a9dc83253ccbae.exe 97 PID 3352 wrote to memory of 4508 3352 1009ea531d3d797473a9dc83253ccbae.exe 97 PID 4508 wrote to memory of 572 4508 DEM3BC1.exe 102 PID 4508 wrote to memory of 572 4508 DEM3BC1.exe 102 PID 4508 wrote to memory of 572 4508 DEM3BC1.exe 102 PID 572 wrote to memory of 3204 572 DEM926C.exe 104 PID 572 wrote to memory of 3204 572 DEM926C.exe 104 PID 572 wrote to memory of 3204 572 DEM926C.exe 104 PID 3204 wrote to memory of 564 3204 DEME8BA.exe 107 PID 3204 wrote to memory of 564 3204 DEME8BA.exe 107 PID 3204 wrote to memory of 564 3204 DEME8BA.exe 107 PID 564 wrote to memory of 2212 564 DEM3EE8.exe 110 PID 564 wrote to memory of 2212 564 DEM3EE8.exe 110 PID 564 wrote to memory of 2212 564 DEM3EE8.exe 110 PID 2212 wrote to memory of 2288 2212 DEM94E8.exe 112 PID 2212 wrote to memory of 2288 2212 DEM94E8.exe 112 PID 2212 wrote to memory of 2288 2212 DEM94E8.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\1009ea531d3d797473a9dc83253ccbae.exe"C:\Users\Admin\AppData\Local\Temp\1009ea531d3d797473a9dc83253ccbae.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\DEM3BC1.exe"C:\Users\Admin\AppData\Local\Temp\DEM3BC1.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\DEM926C.exe"C:\Users\Admin\AppData\Local\Temp\DEM926C.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\DEME8BA.exe"C:\Users\Admin\AppData\Local\Temp\DEME8BA.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\DEM3EE8.exe"C:\Users\Admin\AppData\Local\Temp\DEM3EE8.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\DEM94E8.exe"C:\Users\Admin\AppData\Local\Temp\DEM94E8.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\DEMEB17.exe"C:\Users\Admin\AppData\Local\Temp\DEMEB17.exe"7⤵
- Executes dropped EXE
PID:2288
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5fd20ad801fe7da043c8d7631d38d78d3
SHA13627ea59e7b546a63647ef7cabad9ac73db7c927
SHA2564f513dc3a37bbcdcbbf005f4d82019128483fc1aa6184366d61d3f233baedbc6
SHA5125eb65d23004787acd8c2878ef8bc3a7a47273eeafe061c7e8ba09ac5d77ab0658fdaf9b55d02e47632acb58b9d73be2566da6925a420e4d48f2cb2ec08cf3d92
-
Filesize
14KB
MD51bc1178a135713e5b984aeb6bedd86a6
SHA15dc7710e6266e2d34cdfb3114b2e22cb37e78a25
SHA2561a4700c6c944bd8ef00aa81dd1fed2ff9c8be3ee814410ebf3f2e2c29e1fd882
SHA512d191e3cf757d5220e4b68b2c7dd467949aaa94c77bd6a6918f4882a83eeda21c6842a5728347c9064c476287cddd730d929741c98998ffe4ef2e560c1cd74a71
-
Filesize
14KB
MD555199ad973629b3c823d077ae11aee10
SHA1cfa082bbf6e4e200cc8d1969df2425d0e4c34e7d
SHA2569ec34d12275c1268008995b3c145d38e74f91654ce21ad577f38db4df9a55fc2
SHA51277e221e2a2a61b108159b1779f55d566f88d85d7e69322397a867b42351ba18837ca7aaff45a7e6865e3b751d7e008800a408fd02dd536443dfef4510d35335e
-
Filesize
14KB
MD5c2f008b1fb56378818f57e4eb413dd8f
SHA1873ab071e1fca9cc7059bfc2796041b6b6a47657
SHA2567bdddaf25ad71caae372baf5a991c6dc438e30b9cdd0119d667a247c15982023
SHA512bfc97f1e6e467ee6dc45946c1cf72ecbdbd6068d4c1c809382ea651d4acd0bc98aeadf96f83ad73c3f067ef41e9cb9d0f80ab2a6c9153b6e7c71ca767c2a7432
-
Filesize
14KB
MD5ca181d0e7bf6aa4bb5b3296e9470fc21
SHA18ecc0405ffc0e114603840d7a842b670ddfb3966
SHA25679864d0dff25da3fcd723606a6cb499c9db096e8a9dad6986ca2b482f3331652
SHA5120d8b7674b14e8afe5b6b7f340d5519e645c151be047c71492d9bff1b6c0dd55ab130f0fa1181c2d1d6640652cac3e1db3a0cf3e57369fba68c22da165465ebad
-
Filesize
14KB
MD5f8c6cc5f341c7a8d33e82937b3a1e243
SHA12b5b050a5176ba3e8a8254c5d231bbdb56605d4d
SHA256f4b3f813b4a57decd044274613b3da69c400a506302774e701fdead02f5ff0d6
SHA51233a189d101b8c77a32eb137b93bc79c1f079ab2b73db1a410022dcacd0fd4f9f2834f1d493bd877ea486c70866e3d4c42e8a28d7fed14f40a09204f33ab3dc19