Analysis
-
max time kernel
148s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 22:20
Static task
static1
Behavioral task
behavioral1
Sample
154cf2a1ac77a38aa0d35c2b57d4ea93.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
154cf2a1ac77a38aa0d35c2b57d4ea93.exe
Resource
win10v2004-20231215-en
General
-
Target
154cf2a1ac77a38aa0d35c2b57d4ea93.exe
-
Size
100KB
-
MD5
154cf2a1ac77a38aa0d35c2b57d4ea93
-
SHA1
d2b349e1b8462eef100442109835f43006c5cc20
-
SHA256
dcf93fa8308b36f6cd63a6381c9ee0815dc3eabc830df9db9605581e6354956b
-
SHA512
83fca2e4e2222160daf734994fc9a89109dafc09fae92ff3e6245959e92eb50e2d7fe2c3c743ee59315c9534c0aece140eda8e321bf33bfa8316ddf55c611763
-
SSDEEP
1536:3KiYAF65m3j9LAfw6OPM+eCMBI9K8u1Vn:3KzAU5uJLAIe+eCiwu
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000\Control Panel\International\Geo\Nation 154cf2a1ac77a38aa0d35c2b57d4ea93.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2140 2216 154cf2a1ac77a38aa0d35c2b57d4ea93.exe 20 PID 2216 wrote to memory of 2140 2216 154cf2a1ac77a38aa0d35c2b57d4ea93.exe 20 PID 2216 wrote to memory of 2140 2216 154cf2a1ac77a38aa0d35c2b57d4ea93.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\154cf2a1ac77a38aa0d35c2b57d4ea93.exe"C:\Users\Admin\AppData\Local\Temp\154cf2a1ac77a38aa0d35c2b57d4ea93.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4834.tmp\TOTALCMD.cmd" "2⤵PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17B
MD5e415383c3cad210fcf3fd6a5c0bb5069
SHA149200818107575fb91dad789e8b9623d5f2022ea
SHA256d6a32b87a643fcb9def0fb5fed343d170611d724d8d743a8c3d99b2d76cc0e1d
SHA512c4105000e91a17b8e3e4d87e549670de92f95261eaa658b5bb653027b4b3a27f88f09f2044598c77fb59b1cc8839150885574575aac6f0713e30225ba74984b8