Analysis
-
max time kernel
148s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
19/12/2023, 11:52
Static task
static1
Behavioral task
behavioral1
Sample
18640d585a56dd04f65decc560929682.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
18640d585a56dd04f65decc560929682.exe
Resource
win10v2004-20231215-en
General
-
Target
18640d585a56dd04f65decc560929682.exe
-
Size
14KB
-
MD5
18640d585a56dd04f65decc560929682
-
SHA1
bb14b0c39ea91a4b262acc6dd3091613b23c100b
-
SHA256
52f599ca3e64a727bd0e61b893a6b987d81e9936786c6c64add5a40a8edc5f57
-
SHA512
c6c4569a19d08241e1a714447f4292d05be16cbfd4b1b6451783267ae0910cea1f160b62b3252985d7419f84b7f153cd998d5ae79fa93f5dcc781f1271ecc97a
-
SSDEEP
384:hdtXWiJCQxsEwvK3RpSSHuGQG2Rqm4YhgAHm:hDXWipuE+K3/SSHgxSAG
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation DEMC85C.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation 18640d585a56dd04f65decc560929682.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation DEM6BE9.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation DEMC311.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation DEM1930.exe Key value queried \REGISTRY\USER\S-1-5-21-1815711207-1844170477-3539718864-1000\Control Panel\International\Geo\Nation DEM7088.exe -
Executes dropped EXE 6 IoCs
pid Process 2468 DEM6BE9.exe 4060 DEMC311.exe 3168 DEM1930.exe 680 DEM7088.exe 3068 DEMC85C.exe 808 DEM205F.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4692 wrote to memory of 2468 4692 18640d585a56dd04f65decc560929682.exe 93 PID 4692 wrote to memory of 2468 4692 18640d585a56dd04f65decc560929682.exe 93 PID 4692 wrote to memory of 2468 4692 18640d585a56dd04f65decc560929682.exe 93 PID 2468 wrote to memory of 4060 2468 DEM6BE9.exe 98 PID 2468 wrote to memory of 4060 2468 DEM6BE9.exe 98 PID 2468 wrote to memory of 4060 2468 DEM6BE9.exe 98 PID 4060 wrote to memory of 3168 4060 DEMC311.exe 100 PID 4060 wrote to memory of 3168 4060 DEMC311.exe 100 PID 4060 wrote to memory of 3168 4060 DEMC311.exe 100 PID 3168 wrote to memory of 680 3168 DEM1930.exe 102 PID 3168 wrote to memory of 680 3168 DEM1930.exe 102 PID 3168 wrote to memory of 680 3168 DEM1930.exe 102 PID 680 wrote to memory of 3068 680 DEM7088.exe 104 PID 680 wrote to memory of 3068 680 DEM7088.exe 104 PID 680 wrote to memory of 3068 680 DEM7088.exe 104 PID 3068 wrote to memory of 808 3068 DEMC85C.exe 106 PID 3068 wrote to memory of 808 3068 DEMC85C.exe 106 PID 3068 wrote to memory of 808 3068 DEMC85C.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\18640d585a56dd04f65decc560929682.exe"C:\Users\Admin\AppData\Local\Temp\18640d585a56dd04f65decc560929682.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\DEM6BE9.exe"C:\Users\Admin\AppData\Local\Temp\DEM6BE9.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\DEMC311.exe"C:\Users\Admin\AppData\Local\Temp\DEMC311.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\DEM1930.exe"C:\Users\Admin\AppData\Local\Temp\DEM1930.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\DEM7088.exe"C:\Users\Admin\AppData\Local\Temp\DEM7088.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\DEMC85C.exe"C:\Users\Admin\AppData\Local\Temp\DEMC85C.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\DEM205F.exe"C:\Users\Admin\AppData\Local\Temp\DEM205F.exe"7⤵
- Executes dropped EXE
PID:808
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD55d7fba3cc2d805e48bb9f19bf0834e4b
SHA1b399f30c5bb9653cee48df3a992b4746819f6a1e
SHA25645f41fb253bd551d1f3cb57a6052d3f40c2a793e4ec05eb803d4472957b0afc4
SHA5127127fe71ba19fd8c4e5cc7729b70bc12c6f87551075cffdd3c2725dba7bfe3514b5d6e29f8865a754a84cd0ccd0ecd30bf945ff567acbafe1607ea0090277c40
-
Filesize
14KB
MD58ec4b648194f87987f3e2da06dcf8972
SHA16df2696f242bdd9baf9fe938be848550018f0f42
SHA25628cb4cddb9c889529ad40733e2e8e009c098194c5acb4cb795fefeac51469f96
SHA5127f03dcf13f1e56d6fd5739e5bc4845e08111b822cf621fb73e3729f5d27a04ef56b41d63da6664ca752bfc911427fe488738ce831f6d20d970bd1ca15173891d
-
Filesize
14KB
MD5e3b23be21254abe277ce355593e5bd89
SHA1f08a01d9233282b08500748d94e6c611d902aebb
SHA256c91d580ae7d5ca213f73f30310633abc9c5ccd61c554d42a46aad28ab8c95ca8
SHA512eb1f8a7b082e4e6ad06f97785cf5e635b9d53323c7b95eccf3ec2fd2c812762a11df786993f392c7c9b906a2c0f49749a3bf580bab8259f92900912a80ad6e0f
-
Filesize
14KB
MD57bc240371fce1f6a779c2a5d2d46f388
SHA15ca02c16eeefcbf8444776480cd377ef36ac3b1a
SHA256f537bf024861926f5d9af0da06ba849e1ff6dea68af3ff30e13fccb205f58b91
SHA512d83ef8d1b61a7c31451b72e5b012567fd924884c4c9018f0d9c6f6cd35d5099615e5d008e3a3014d7af680a3f4d3825ab1c675da5c57806ae475e4a9e3ea9691
-
Filesize
14KB
MD5c3c86cf48ca822b921af614b78bb76dc
SHA1d986a80b79d6c86b855d0113940ac9067dbd1ad7
SHA2569cf354a1de7dea89bda2e84b7931b33937df8e3b910216e7d94fc7d2e155e3df
SHA512761fc1e3ca0befac15300c9b018b1245e99bb68e4abba95ced9149a01a2517d4148418013970733b408850732f8d1b8842eb63ec7b5ab539bef6238492146e49
-
Filesize
14KB
MD53120269a1c72ffde4c672ae3bf767889
SHA1926d7b23b005e459d4d0e03069a9611ae7876ada
SHA256ce36eab149dd86ed89f837e2f1628d32b69ad172c3018a2bca12c48d05e0bd73
SHA512d28bd7ef047197656765ea083c241d10ba8865bd9fc1f5b120f0fabfc88dc481567c5ac950071a215c97a8f8bb844f1509c8709fc81b126fbe548a5cc25834fa