Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
22/12/2023, 15:45
Behavioral task
behavioral1
Sample
df691dde59291e5ee46526b807d13910.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
df691dde59291e5ee46526b807d13910.exe
Resource
win10v2004-20231215-en
General
-
Target
df691dde59291e5ee46526b807d13910.exe
-
Size
1.4MB
-
MD5
df691dde59291e5ee46526b807d13910
-
SHA1
7393ec37f034e167de0008d4e5ed4db06827770f
-
SHA256
76ca85b6f3b8188dd30fcb2e1e8c2db278c4d9b5c739a742b94378684ece3ed4
-
SHA512
0feb52a07680fcdd1e69ccb002dea56da5a41c9d1a29beadc1fc402fef26c7f606cd96893508c9f4390d5ec71dbd840f0ce282eba9a16fc9e1401c8fa34b9e00
-
SSDEEP
24576:lYTTGaM6TB9J3OkULQzJnomiOf4PkWuSi/yPef0pfWwIMprcGzg2qqp6xGr8Dyxe:FATB/3q+oTOf4NEoh3pJF8exe
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2398549320-3657759451-817663969-1000\Control Panel\International\Geo\Nation df691dde59291e5ee46526b807d13910.exe -
resource yara_rule behavioral2/memory/1424-0-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1424-160-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1424 wrote to memory of 380 1424 df691dde59291e5ee46526b807d13910.exe 92 PID 1424 wrote to memory of 380 1424 df691dde59291e5ee46526b807d13910.exe 92 PID 1424 wrote to memory of 380 1424 df691dde59291e5ee46526b807d13910.exe 92 PID 380 wrote to memory of 4732 380 cmd.exe 94 PID 380 wrote to memory of 4732 380 cmd.exe 94 PID 380 wrote to memory of 4732 380 cmd.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\df691dde59291e5ee46526b807d13910.exe"C:\Users\Admin\AppData\Local\Temp\df691dde59291e5ee46526b807d13910.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\RUNFIRST.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Windows\SysWOW64\mode.commode con: lines=603⤵PID:4732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD5a4d07b37bc7f6e121c0110d848ab65c6
SHA1deb92144dda5f73b85e1b8dfa5d0eb076e952d03
SHA2560d2feb7e7ffd55f0cd2fe21e18865658d44696ce23b820aa3606d8c45242b13b
SHA512c6c685905e840b05c1940072676e0a533493de185c6bda22ea2a825f392b39f0452a88b1c46fcd9417882a19515b5dd502c4b71ac82b5259147a36b7226967ae